General
-
Target
a99b4e54ceee99b71fcd207ad7c951cd_JaffaCakes118
-
Size
27.7MB
-
Sample
240614-pb3qjstepq
-
MD5
a99b4e54ceee99b71fcd207ad7c951cd
-
SHA1
5063668700f6c9661edee34cc9d21957a836f4cc
-
SHA256
8924ee0f4d895ce882b2e3cc5cab97663c8217fa232cc4e361cf2e3234c7dd94
-
SHA512
457ef6b062374522c5e8e4c7704ab73cdbe81056c3f3d6287d0c886cdaa9661532df3270e419146cc47ffc9cd89e2df78cd03207f89dc4ba9e7977959dc30fdd
-
SSDEEP
786432:qPsPZA40XOvBCJsVw/K7pD2BpwaXRkM70y:nTBCOo4x2FXOMl
Static task
static1
Behavioral task
behavioral1
Sample
a99b4e54ceee99b71fcd207ad7c951cd_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
a99b4e54ceee99b71fcd207ad7c951cd_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
a99b4e54ceee99b71fcd207ad7c951cd_JaffaCakes118
-
Size
27.7MB
-
MD5
a99b4e54ceee99b71fcd207ad7c951cd
-
SHA1
5063668700f6c9661edee34cc9d21957a836f4cc
-
SHA256
8924ee0f4d895ce882b2e3cc5cab97663c8217fa232cc4e361cf2e3234c7dd94
-
SHA512
457ef6b062374522c5e8e4c7704ab73cdbe81056c3f3d6287d0c886cdaa9661532df3270e419146cc47ffc9cd89e2df78cd03207f89dc4ba9e7977959dc30fdd
-
SSDEEP
786432:qPsPZA40XOvBCJsVw/K7pD2BpwaXRkM70y:nTBCOo4x2FXOMl
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-