General
-
Target
9151f0cf9d63a880ab321de58286efdb_JaffaCakes118
-
Size
1.6MB
-
Sample
240603-lqgvvaad5z
-
MD5
9151f0cf9d63a880ab321de58286efdb
-
SHA1
338a46ab6d587c128200d6324b0cdecebf5d6dab
-
SHA256
fa9035e8e5788b3ad9ea98ae11c9757c6702d7bec8083a07d14aee39ba7295e4
-
SHA512
38ec93479bdf611e1d2113584b1cb0e261082cb963825331335ec8e891fa3aecc99f7a6db23c89376c3509063c49c1beb82121aec35bfd5363adb3b738aa7ae3
-
SSDEEP
24576:6ihv/jfKO7CNo8I/ZhNKa7xa9dgUrFmXKA3Q3Iu7rBG+wRHQlNYtaZfE:LdfK7e/TLEdgUYXKuUrUzHEE
Static task
static1
Behavioral task
behavioral1
Sample
9151f0cf9d63a880ab321de58286efdb_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
9151f0cf9d63a880ab321de58286efdb_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
9151f0cf9d63a880ab321de58286efdb_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
9151f0cf9d63a880ab321de58286efdb_JaffaCakes118
-
Size
1.6MB
-
MD5
9151f0cf9d63a880ab321de58286efdb
-
SHA1
338a46ab6d587c128200d6324b0cdecebf5d6dab
-
SHA256
fa9035e8e5788b3ad9ea98ae11c9757c6702d7bec8083a07d14aee39ba7295e4
-
SHA512
38ec93479bdf611e1d2113584b1cb0e261082cb963825331335ec8e891fa3aecc99f7a6db23c89376c3509063c49c1beb82121aec35bfd5363adb3b738aa7ae3
-
SSDEEP
24576:6ihv/jfKO7CNo8I/ZhNKa7xa9dgUrFmXKA3Q3Iu7rBG+wRHQlNYtaZfE:LdfK7e/TLEdgUYXKuUrUzHEE
-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-