General
-
Target
917411edffc4727d345eaacd6f3c4e4c_JaffaCakes118
-
Size
4.4MB
-
Sample
240603-mka1sabd3w
-
MD5
917411edffc4727d345eaacd6f3c4e4c
-
SHA1
6b0ec0edff8fcb15049b40afecd3fe715f0ffc8a
-
SHA256
12c58f9028a639bdaf53875cafcb5fbc6fb99c0d81cf4001dd8dbc2a817a40cf
-
SHA512
50152cdbcf40567fb8c2f1d3764d512a62a8e7add6f38b6b45fbe7a5f77639df1607841bb234c9cafb6605cd2adc9acc0f8527b76ee4084b492e69011f1a3091
-
SSDEEP
98304:tBOgw/MkVL0WwDBqbk1EKVwjDuKKqCxNVRpayOmg5Yx7UY4kts1:tBJ6ePCk1LeuKDodE9mgi6Y1ti
Static task
static1
Behavioral task
behavioral1
Sample
917411edffc4727d345eaacd6f3c4e4c_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
917411edffc4727d345eaacd6f3c4e4c_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
917411edffc4727d345eaacd6f3c4e4c_JaffaCakes118
-
Size
4.4MB
-
MD5
917411edffc4727d345eaacd6f3c4e4c
-
SHA1
6b0ec0edff8fcb15049b40afecd3fe715f0ffc8a
-
SHA256
12c58f9028a639bdaf53875cafcb5fbc6fb99c0d81cf4001dd8dbc2a817a40cf
-
SHA512
50152cdbcf40567fb8c2f1d3764d512a62a8e7add6f38b6b45fbe7a5f77639df1607841bb234c9cafb6605cd2adc9acc0f8527b76ee4084b492e69011f1a3091
-
SSDEEP
98304:tBOgw/MkVL0WwDBqbk1EKVwjDuKKqCxNVRpayOmg5Yx7UY4kts1:tBJ6ePCk1LeuKDodE9mgi6Y1ti
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-