General
-
Target
aaec5eecdc0a3e75dbaee0eca053f46a_JaffaCakes118
-
Size
783KB
-
Sample
240614-v334aazena
-
MD5
aaec5eecdc0a3e75dbaee0eca053f46a
-
SHA1
009f4b563b61ea87696837d2ce9047467cb42ae3
-
SHA256
c7b11759c0274bbfd5e7b4217132f18c7412993f143bf252c613a8eb3cfc8e07
-
SHA512
c4e2cb3ec9d7c684724d3fbedfaac99d52af3dcabf98842c23296ea10d6bb632b252d00c248d6243c191a7744e1daaa3a4af594b29984f5250bbdf1c0398d614
-
SSDEEP
12288:o1Gbsfm5oFD5tYdne4HeLRWkt9EXv5lotsA5tpL767u5uat68vAK3twIxhOoHVVT:OvioF7dhM+EXB2sSt176yHo8htZwk
Static task
static1
Behavioral task
behavioral1
Sample
aaec5eecdc0a3e75dbaee0eca053f46a_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
aaec5eecdc0a3e75dbaee0eca053f46a_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
aaec5eecdc0a3e75dbaee0eca053f46a_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
aaec5eecdc0a3e75dbaee0eca053f46a_JaffaCakes118
-
Size
783KB
-
MD5
aaec5eecdc0a3e75dbaee0eca053f46a
-
SHA1
009f4b563b61ea87696837d2ce9047467cb42ae3
-
SHA256
c7b11759c0274bbfd5e7b4217132f18c7412993f143bf252c613a8eb3cfc8e07
-
SHA512
c4e2cb3ec9d7c684724d3fbedfaac99d52af3dcabf98842c23296ea10d6bb632b252d00c248d6243c191a7744e1daaa3a4af594b29984f5250bbdf1c0398d614
-
SSDEEP
12288:o1Gbsfm5oFD5tYdne4HeLRWkt9EXv5lotsA5tpL767u5uat68vAK3twIxhOoHVVT:OvioF7dhM+EXB2sSt176yHo8htZwk
-
Checks Android system properties for emulator presence.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the phone number (MSISDN for GSM devices)
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-