General
-
Target
9d630872f0b900773b681dcc81f24efc_JaffaCakes118
-
Size
6.1MB
-
Sample
240611-h1pfwsyhnr
-
MD5
9d630872f0b900773b681dcc81f24efc
-
SHA1
a575cc6ef396eca8168d96250f4376d0c47264a5
-
SHA256
fe82930171c52fb55a28fd17f40489816268dfb082931e1a404e43689c703879
-
SHA512
d6d618b99ff2957b114fea40505bf0c0d0ee11ac10a3f5bfa351706819e761118e6b4b2b5b47882130c8470de4736acaa63c7b054619cc7e59f5a748e008c561
-
SSDEEP
98304:o9drTLh7pUcxh7EMEjzeJ8p++qc1v8qKeL3jzJDfYIfqFrVUr5owx9zf0NYAg:oNhozeJO+bcpJrxTYIKrVUl5f0Kv
Static task
static1
Behavioral task
behavioral1
Sample
9d630872f0b900773b681dcc81f24efc_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
9d630872f0b900773b681dcc81f24efc_JaffaCakes118.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral3
Sample
9d630872f0b900773b681dcc81f24efc_JaffaCakes118.apk
Resource
android-x64-arm64-20240603-en
Malware Config
Targets
-
-
Target
9d630872f0b900773b681dcc81f24efc_JaffaCakes118
-
Size
6.1MB
-
MD5
9d630872f0b900773b681dcc81f24efc
-
SHA1
a575cc6ef396eca8168d96250f4376d0c47264a5
-
SHA256
fe82930171c52fb55a28fd17f40489816268dfb082931e1a404e43689c703879
-
SHA512
d6d618b99ff2957b114fea40505bf0c0d0ee11ac10a3f5bfa351706819e761118e6b4b2b5b47882130c8470de4736acaa63c7b054619cc7e59f5a748e008c561
-
SSDEEP
98304:o9drTLh7pUcxh7EMEjzeJ8p++qc1v8qKeL3jzJDfYIfqFrVUr5owx9zf0NYAg:oNhozeJO+bcpJrxTYIKrVUl5f0Kv
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-