General
-
Target
98f494f75a9fc2671fcc01e6e406da46_JaffaCakes118
-
Size
20.8MB
-
Sample
240605-xj6q6sff52
-
MD5
98f494f75a9fc2671fcc01e6e406da46
-
SHA1
597748177f867f94331b79aac5f2a3aa28358fc7
-
SHA256
36ab7a10740b39cb4e25fd66b5f4a2db280a963be8c646a659e58de76e2cef8f
-
SHA512
35be13982bf3601332c05e7fccb713dce24de1bdac387d4e832cf5a6dc1d8f1d0752b9910bf137d404c51e9933c8533a781d4600988711dc4353aa5105d888aa
-
SSDEEP
393216:2dnfiO7UZLkJMAyLUj/ieyIks8fdnFWckhP1JA/VNjvQ7gQ+8gTR2:2FXlMAgCjkVnQnJA/LQMQ+Y
Static task
static1
Behavioral task
behavioral1
Sample
98f494f75a9fc2671fcc01e6e406da46_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
98f494f75a9fc2671fcc01e6e406da46_JaffaCakes118.apk
Resource
android-x64-arm64-20240603-en
Malware Config
Targets
-
-
Target
98f494f75a9fc2671fcc01e6e406da46_JaffaCakes118
-
Size
20.8MB
-
MD5
98f494f75a9fc2671fcc01e6e406da46
-
SHA1
597748177f867f94331b79aac5f2a3aa28358fc7
-
SHA256
36ab7a10740b39cb4e25fd66b5f4a2db280a963be8c646a659e58de76e2cef8f
-
SHA512
35be13982bf3601332c05e7fccb713dce24de1bdac387d4e832cf5a6dc1d8f1d0752b9910bf137d404c51e9933c8533a781d4600988711dc4353aa5105d888aa
-
SSDEEP
393216:2dnfiO7UZLkJMAyLUj/ieyIks8fdnFWckhP1JA/VNjvQ7gQ+8gTR2:2FXlMAgCjkVnQnJA/LQMQ+Y
-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries the mobile country code (MCC)
-