General
-
Target
9c73103c241d5a54e0957b68c6087fb5_JaffaCakes118
-
Size
6.7MB
-
Sample
240611-awr28axejj
-
MD5
9c73103c241d5a54e0957b68c6087fb5
-
SHA1
8fe86a517e4dcc915f8670b6ea06ecb607511f4f
-
SHA256
80c2930914430fb92e04f4764943bceb6304405424250da8a2ed0bb4e3dd8f9f
-
SHA512
b1b2c413bfefe5c415a276a78d07885b8a8a3037c5916a3cb85efb755c89069f36d7088f1d7ff03fe4e70fb29df341e3c64deaaad761e637ffc93358e5e09680
-
SSDEEP
196608:NkMZx9nNoD1CqOu2mFFO2enYXiNALfgIjDMmk+4WMQ:/jfbu2mFM23ikfVjY+qQ
Static task
static1
Behavioral task
behavioral1
Sample
9c73103c241d5a54e0957b68c6087fb5_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
9c73103c241d5a54e0957b68c6087fb5_JaffaCakes118.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral3
Sample
9c73103c241d5a54e0957b68c6087fb5_JaffaCakes118.apk
Resource
android-x64-arm64-20240603-en
Malware Config
Targets
-
-
Target
9c73103c241d5a54e0957b68c6087fb5_JaffaCakes118
-
Size
6.7MB
-
MD5
9c73103c241d5a54e0957b68c6087fb5
-
SHA1
8fe86a517e4dcc915f8670b6ea06ecb607511f4f
-
SHA256
80c2930914430fb92e04f4764943bceb6304405424250da8a2ed0bb4e3dd8f9f
-
SHA512
b1b2c413bfefe5c415a276a78d07885b8a8a3037c5916a3cb85efb755c89069f36d7088f1d7ff03fe4e70fb29df341e3c64deaaad761e637ffc93358e5e09680
-
SSDEEP
196608:NkMZx9nNoD1CqOu2mFFO2enYXiNALfgIjDMmk+4WMQ:/jfbu2mFM23ikfVjY+qQ
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-