General
-
Target
99a753bd1f2d5dc1bd6cbe047b25d92d_JaffaCakes118
-
Size
14.7MB
-
Sample
240606-a5a53adh93
-
MD5
99a753bd1f2d5dc1bd6cbe047b25d92d
-
SHA1
6a3c406dfaf05e7f90f999ab652b4c2e52155fcf
-
SHA256
ba6ffd7368be839a6888c2074afb8974b7fd429f63cb64f2c0ee1592b27c5fa5
-
SHA512
291d266c69fc61763ce8db23164fc5e2977091a5697d89758289afedddef30773fac46b508291d4b385439f4d27008e5baa88a596bf611638bc404530755621c
-
SSDEEP
196608:21u+HnDZLB7HyjF7s6+a03hL3H8n/6Lxgk03hL3H8n/6Lxgm5mpWj0Oyfy0OyfP:InDjASLMnGxgkSLMnGxgm+FfDFfP
Static task
static1
Behavioral task
behavioral1
Sample
99a753bd1f2d5dc1bd6cbe047b25d92d_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
99a753bd1f2d5dc1bd6cbe047b25d92d_JaffaCakes118.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral3
Sample
99a753bd1f2d5dc1bd6cbe047b25d92d_JaffaCakes118.apk
Resource
android-x64-arm64-20240603-en
Malware Config
Targets
-
-
Target
99a753bd1f2d5dc1bd6cbe047b25d92d_JaffaCakes118
-
Size
14.7MB
-
MD5
99a753bd1f2d5dc1bd6cbe047b25d92d
-
SHA1
6a3c406dfaf05e7f90f999ab652b4c2e52155fcf
-
SHA256
ba6ffd7368be839a6888c2074afb8974b7fd429f63cb64f2c0ee1592b27c5fa5
-
SHA512
291d266c69fc61763ce8db23164fc5e2977091a5697d89758289afedddef30773fac46b508291d4b385439f4d27008e5baa88a596bf611638bc404530755621c
-
SSDEEP
196608:21u+HnDZLB7HyjF7s6+a03hL3H8n/6Lxgk03hL3H8n/6Lxgm5mpWj0Oyfy0OyfP:InDjASLMnGxgkSLMnGxgm+FfDFfP
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-