General
-
Target
9b5741dd8c9e803a3650ac461ec99117_JaffaCakes118
-
Size
11.5MB
-
Sample
240610-t61a5atfpq
-
MD5
9b5741dd8c9e803a3650ac461ec99117
-
SHA1
a6fcb55fb8ab541ae4ded43fb53d996ddd40de2a
-
SHA256
955be5bb9d093e6750782f95ed25f390e168c5f3118fec45ae65ceb4424614b7
-
SHA512
76d25a7b5934ce2b52484cd7ab44ec59de23ca631420fb795b1267fef2b82be953b340bec3696f852977da989cdf1dd3c243c6e4e32a4f0d06fcf3825333074b
-
SSDEEP
196608:ETet2wTtJR6Rxifr2r/8PcLPBMQwifWfHFB0gCtDM1n2vgr2krNyDq:Zt2wTtJRaSrkLP2HuM1Kg5uq
Static task
static1
Behavioral task
behavioral1
Sample
9b5741dd8c9e803a3650ac461ec99117_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
9b5741dd8c9e803a3650ac461ec99117_JaffaCakes118.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral3
Sample
9b5741dd8c9e803a3650ac461ec99117_JaffaCakes118.apk
Resource
android-x64-arm64-20240603-en
Malware Config
Targets
-
-
Target
9b5741dd8c9e803a3650ac461ec99117_JaffaCakes118
-
Size
11.5MB
-
MD5
9b5741dd8c9e803a3650ac461ec99117
-
SHA1
a6fcb55fb8ab541ae4ded43fb53d996ddd40de2a
-
SHA256
955be5bb9d093e6750782f95ed25f390e168c5f3118fec45ae65ceb4424614b7
-
SHA512
76d25a7b5934ce2b52484cd7ab44ec59de23ca631420fb795b1267fef2b82be953b340bec3696f852977da989cdf1dd3c243c6e4e32a4f0d06fcf3825333074b
-
SSDEEP
196608:ETet2wTtJR6Rxifr2r/8PcLPBMQwifWfHFB0gCtDM1n2vgr2krNyDq:Zt2wTtJRaSrkLP2HuM1Kg5uq
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-