General
-
Target
9870f51b14e094351f779eaa7f6e13e7_JaffaCakes118
-
Size
2.0MB
-
Sample
240605-sakecsba49
-
MD5
9870f51b14e094351f779eaa7f6e13e7
-
SHA1
e38efb7aa8bd2ede2ea177cf6506694b4dbca7e6
-
SHA256
ac9bd2769aba08047346d99326a20e5ad42c4990f172d84aecd0633de9a533de
-
SHA512
ff430987e821d2919ff532acdf4d8fd1956ed1e64d09e25a0c3a860969ece608913d7bc31825fc0347c973ee2f9ea9799e98310f421aef1350d785d1f4a56a48
-
SSDEEP
49152:dubfats2Q2nQtVDvtj2GbGKQGVtlASV5bk7kCn:kj0s2Q4IR24GdyA4k7k0
Static task
static1
Behavioral task
behavioral1
Sample
9870f51b14e094351f779eaa7f6e13e7_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
9870f51b14e094351f779eaa7f6e13e7_JaffaCakes118.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral3
Sample
9870f51b14e094351f779eaa7f6e13e7_JaffaCakes118.apk
Resource
android-x64-arm64-20240603-en
Malware Config
Targets
-
-
Target
9870f51b14e094351f779eaa7f6e13e7_JaffaCakes118
-
Size
2.0MB
-
MD5
9870f51b14e094351f779eaa7f6e13e7
-
SHA1
e38efb7aa8bd2ede2ea177cf6506694b4dbca7e6
-
SHA256
ac9bd2769aba08047346d99326a20e5ad42c4990f172d84aecd0633de9a533de
-
SHA512
ff430987e821d2919ff532acdf4d8fd1956ed1e64d09e25a0c3a860969ece608913d7bc31825fc0347c973ee2f9ea9799e98310f421aef1350d785d1f4a56a48
-
SSDEEP
49152:dubfats2Q2nQtVDvtj2GbGKQGVtlASV5bk7kCn:kj0s2Q4IR24GdyA4k7k0
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-