General
-
Target
abacc79498919f5fa0edcdfd70fe4840_JaffaCakes118
-
Size
31.8MB
-
Sample
240614-1z4hja1gnr
-
MD5
abacc79498919f5fa0edcdfd70fe4840
-
SHA1
58509ff752fa3911b235dfb1fbe01a454fda9910
-
SHA256
f94b8fc2d67c5a7a2b839ef09517f06bb56cd7aeb988d82f91676c98862c3e30
-
SHA512
33172730067af7f264cfd9e75acf4162561bfd11bad0a16a1538ced8b84b09624d3016da8394a381775fa6959363b6892ea5aac539fdea398064de6fe6d60757
-
SSDEEP
786432:psVqVoAAVKSMHw9drIIm4LTm072C/aAAc1HK40N81LTq:psqoAbSMHU5R7LTm4dSmf0e1fq
Static task
static1
Behavioral task
behavioral1
Sample
abacc79498919f5fa0edcdfd70fe4840_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
abacc79498919f5fa0edcdfd70fe4840_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
abacc79498919f5fa0edcdfd70fe4840_JaffaCakes118
-
Size
31.8MB
-
MD5
abacc79498919f5fa0edcdfd70fe4840
-
SHA1
58509ff752fa3911b235dfb1fbe01a454fda9910
-
SHA256
f94b8fc2d67c5a7a2b839ef09517f06bb56cd7aeb988d82f91676c98862c3e30
-
SHA512
33172730067af7f264cfd9e75acf4162561bfd11bad0a16a1538ced8b84b09624d3016da8394a381775fa6959363b6892ea5aac539fdea398064de6fe6d60757
-
SSDEEP
786432:psVqVoAAVKSMHw9drIIm4LTm072C/aAAc1HK40N81LTq:psqoAbSMHU5R7LTm4dSmf0e1fq
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Listens for changes in the sensor environment (might be used to detect emulation)
-