General
-
Target
a8b2c7c244518b9cff8ff6620d176333_JaffaCakes118
-
Size
30.9MB
-
Sample
240614-j68x6asbma
-
MD5
a8b2c7c244518b9cff8ff6620d176333
-
SHA1
3cc0b258f64bf9784c447d7decefa02874207908
-
SHA256
9d2ce612426fa45aaf1a5e533ff1ddca698543753f1fbb20156c3af62fbc3103
-
SHA512
df1430a20ce8b3c769b9d40fc2008d763b05d73310638bfd3b6aa9a645b2609b93a24a163c58d80d7ff68abae41aa2e2c9c817dc4031b168caa25515f6bafe79
-
SSDEEP
786432:saN+RH+Y/w9Ixvg4/cwkHVVhVVvtJPP5ZSu2:saN+ReRixt/0tPvtRx12
Static task
static1
Behavioral task
behavioral1
Sample
a8b2c7c244518b9cff8ff6620d176333_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
a8b2c7c244518b9cff8ff6620d176333_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
a8b2c7c244518b9cff8ff6620d176333_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
a8b2c7c244518b9cff8ff6620d176333_JaffaCakes118
-
Size
30.9MB
-
MD5
a8b2c7c244518b9cff8ff6620d176333
-
SHA1
3cc0b258f64bf9784c447d7decefa02874207908
-
SHA256
9d2ce612426fa45aaf1a5e533ff1ddca698543753f1fbb20156c3af62fbc3103
-
SHA512
df1430a20ce8b3c769b9d40fc2008d763b05d73310638bfd3b6aa9a645b2609b93a24a163c58d80d7ff68abae41aa2e2c9c817dc4031b168caa25515f6bafe79
-
SSDEEP
786432:saN+RH+Y/w9Ixvg4/cwkHVVhVVvtJPP5ZSu2:saN+ReRixt/0tPvtRx12
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Checks the presence of a debugger
-