General
-
Target
aa3e1426011603758c9f516b356dc76b_JaffaCakes118
-
Size
25.1MB
-
Sample
240614-r4k3bayeqk
-
MD5
aa3e1426011603758c9f516b356dc76b
-
SHA1
2f89f00a18371ea23ce687164b9b298090e8999f
-
SHA256
e8da1a8e4f74ca73795c4f3544a21c238aedbef3342dd1b08b252a53fc149e58
-
SHA512
6118bd6f11893e0e1b57296c6ba447d5b5bfbf2a9508a094c49a326adfe121210357e2187d57fce73679972b0d856b3b151904cdd30404afc1425600cf503357
-
SSDEEP
786432:vcTYo9PYBxyLQ9pS6QWKBilaovSSQ0ykr6:vcjhAyLQvJhrl7Smr6
Static task
static1
Behavioral task
behavioral1
Sample
aa3e1426011603758c9f516b356dc76b_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
aa3e1426011603758c9f516b356dc76b_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
aa3e1426011603758c9f516b356dc76b_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
aa3e1426011603758c9f516b356dc76b_JaffaCakes118
-
Size
25.1MB
-
MD5
aa3e1426011603758c9f516b356dc76b
-
SHA1
2f89f00a18371ea23ce687164b9b298090e8999f
-
SHA256
e8da1a8e4f74ca73795c4f3544a21c238aedbef3342dd1b08b252a53fc149e58
-
SHA512
6118bd6f11893e0e1b57296c6ba447d5b5bfbf2a9508a094c49a326adfe121210357e2187d57fce73679972b0d856b3b151904cdd30404afc1425600cf503357
-
SSDEEP
786432:vcTYo9PYBxyLQ9pS6QWKBilaovSSQ0ykr6:vcjhAyLQvJhrl7Smr6
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-