General
-
Target
9c8d7f1b106804b81f2ac9f4299541a2_JaffaCakes118
-
Size
6.1MB
-
Sample
240611-bnx4yaybrf
-
MD5
9c8d7f1b106804b81f2ac9f4299541a2
-
SHA1
9a567e9210908ebb3aea9d0a52dfc6b0d3359ea3
-
SHA256
e839085fd6b075132f9f84123cd77f1c7afd3728e88826ee53e83f3f4fdfff08
-
SHA512
3b3ec71414b20c1a9a2a103c79298766ab11ee884843eda40c4ca7a3f5c848de295010e16e00304f2134823253f6da54580e8657d3d6df1bd7b5ff3774e1fd8a
-
SSDEEP
196608:pQZhozep0YsypOGlavY8M1nHFr45dxHGSf0Kc:pQk4xJl421HFk5dxmSf5c
Static task
static1
Behavioral task
behavioral1
Sample
9c8d7f1b106804b81f2ac9f4299541a2_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
9c8d7f1b106804b81f2ac9f4299541a2_JaffaCakes118.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral3
Sample
9c8d7f1b106804b81f2ac9f4299541a2_JaffaCakes118.apk
Resource
android-x64-arm64-20240603-en
Malware Config
Targets
-
-
Target
9c8d7f1b106804b81f2ac9f4299541a2_JaffaCakes118
-
Size
6.1MB
-
MD5
9c8d7f1b106804b81f2ac9f4299541a2
-
SHA1
9a567e9210908ebb3aea9d0a52dfc6b0d3359ea3
-
SHA256
e839085fd6b075132f9f84123cd77f1c7afd3728e88826ee53e83f3f4fdfff08
-
SHA512
3b3ec71414b20c1a9a2a103c79298766ab11ee884843eda40c4ca7a3f5c848de295010e16e00304f2134823253f6da54580e8657d3d6df1bd7b5ff3774e1fd8a
-
SSDEEP
196608:pQZhozep0YsypOGlavY8M1nHFr45dxHGSf0Kc:pQk4xJl421HFk5dxmSf5c
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-