General
-
Target
9a0fb185d65ac243a11f187c972a62f1_JaffaCakes118
-
Size
10.0MB
-
Sample
240606-f9raqshf6x
-
MD5
9a0fb185d65ac243a11f187c972a62f1
-
SHA1
c1feb1acd38020bf1040a51b5f0177e487b09275
-
SHA256
8d133896b4508367c2a4918414a0e5a467a80dc8328890ec2a884df1e8ec123a
-
SHA512
9f78b261222fc994acee075ef5a44cbbbf96ce11768e857b4a9397f1f7574a4fd88e5ac3b21f976fba3d71095ebdc580cb26b1d986944bf2f6f8a50624a67eab
-
SSDEEP
196608:1S+V4k/Q4hM+rQaHoK0WL91CWIEK5f+yGJmSue525bfRnJjQDXU:w+V4k/Q4u+rQqBZID5fawXaU
Static task
static1
Behavioral task
behavioral1
Sample
9a0fb185d65ac243a11f187c972a62f1_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
9a0fb185d65ac243a11f187c972a62f1_JaffaCakes118.apk
Resource
android-x64-20240603-en
Malware Config
Targets
-
-
Target
9a0fb185d65ac243a11f187c972a62f1_JaffaCakes118
-
Size
10.0MB
-
MD5
9a0fb185d65ac243a11f187c972a62f1
-
SHA1
c1feb1acd38020bf1040a51b5f0177e487b09275
-
SHA256
8d133896b4508367c2a4918414a0e5a467a80dc8328890ec2a884df1e8ec123a
-
SHA512
9f78b261222fc994acee075ef5a44cbbbf96ce11768e857b4a9397f1f7574a4fd88e5ac3b21f976fba3d71095ebdc580cb26b1d986944bf2f6f8a50624a67eab
-
SSDEEP
196608:1S+V4k/Q4hM+rQaHoK0WL91CWIEK5f+yGJmSue525bfRnJjQDXU:w+V4k/Q4u+rQqBZID5fawXaU
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-