General
-
Target
98246c745c3169d42cd5f0d230449a11_JaffaCakes118
-
Size
30.9MB
-
Sample
240605-pg14xaga49
-
MD5
98246c745c3169d42cd5f0d230449a11
-
SHA1
fc3e34a10a691dabe68ab2e8cd1389d25cd5c459
-
SHA256
a2a0f87596aaa77065c3b1a4e6b3f87372ae40bd110f5ab93b701cbe1359a927
-
SHA512
f28b460309cc2552b0bf747d5db3260261dabc49899dce3ffee2e1e3b9c0f6543a58c2eca3671737ed5bd312cf23e9cc7a17675ff62b20398e5274499474fd8b
-
SSDEEP
786432:eH07YgGhgRkdpx8k4z2PB2jMrO4PF3lmafg56to9959:20pmgRkjako25UMrOuuPrX
Static task
static1
Behavioral task
behavioral1
Sample
98246c745c3169d42cd5f0d230449a11_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
98246c745c3169d42cd5f0d230449a11_JaffaCakes118.apk
Resource
android-x64-arm64-20240603-en
Malware Config
Targets
-
-
Target
98246c745c3169d42cd5f0d230449a11_JaffaCakes118
-
Size
30.9MB
-
MD5
98246c745c3169d42cd5f0d230449a11
-
SHA1
fc3e34a10a691dabe68ab2e8cd1389d25cd5c459
-
SHA256
a2a0f87596aaa77065c3b1a4e6b3f87372ae40bd110f5ab93b701cbe1359a927
-
SHA512
f28b460309cc2552b0bf747d5db3260261dabc49899dce3ffee2e1e3b9c0f6543a58c2eca3671737ed5bd312cf23e9cc7a17675ff62b20398e5274499474fd8b
-
SSDEEP
786432:eH07YgGhgRkdpx8k4z2PB2jMrO4PF3lmafg56to9959:20pmgRkjako25UMrOuuPrX
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries the phone number (MSISDN for GSM devices)
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-