General
-
Target
9d1f570c3d8ce184fc5179aa22cac668_JaffaCakes118
-
Size
4.4MB
-
Sample
240611-f55mkawdjg
-
MD5
9d1f570c3d8ce184fc5179aa22cac668
-
SHA1
a952944d581aae18c3a6df2f5b36c9547cb3deed
-
SHA256
8bda2cf8936d402b8714d3008dfc88e1000e9656e82f2c08bdd81ace118bfffd
-
SHA512
b9b3c3a9a240abdc307a3fc1f2ea93ac5faeb266f46cedc636d9fa3f8c1a4bc7ba6743b01918ecc4a6a5a51931ed3f31111344e6af24a0e3cc7c3ef88ae55ed4
-
SSDEEP
98304:UZ5SGHc1Us6omxde73mZE0r3Fz1/mSKeegtUNtTxKoZOl0R9W:CHcKLxde72ZE0BtRUNR10lD
Static task
static1
Behavioral task
behavioral1
Sample
9d1f570c3d8ce184fc5179aa22cac668_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
9d1f570c3d8ce184fc5179aa22cac668_JaffaCakes118.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral3
Sample
9d1f570c3d8ce184fc5179aa22cac668_JaffaCakes118.apk
Resource
android-x64-arm64-20240603-en
Malware Config
Targets
-
-
Target
9d1f570c3d8ce184fc5179aa22cac668_JaffaCakes118
-
Size
4.4MB
-
MD5
9d1f570c3d8ce184fc5179aa22cac668
-
SHA1
a952944d581aae18c3a6df2f5b36c9547cb3deed
-
SHA256
8bda2cf8936d402b8714d3008dfc88e1000e9656e82f2c08bdd81ace118bfffd
-
SHA512
b9b3c3a9a240abdc307a3fc1f2ea93ac5faeb266f46cedc636d9fa3f8c1a4bc7ba6743b01918ecc4a6a5a51931ed3f31111344e6af24a0e3cc7c3ef88ae55ed4
-
SSDEEP
98304:UZ5SGHc1Us6omxde73mZE0r3Fz1/mSKeegtUNtTxKoZOl0R9W:CHcKLxde72ZE0BtRUNR10lD
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-