General
-
Target
ab45a821c176a0387239da0e5d1e393d_JaffaCakes118
-
Size
842KB
-
Sample
240614-y1yybsyajm
-
MD5
ab45a821c176a0387239da0e5d1e393d
-
SHA1
1084fbb0b32def2403b103fc4e7b8fc59d847a23
-
SHA256
ee8d3e1f2a401d454616899b4ea0e2013e32770d3367aa8ef2bdcfec8c8f085b
-
SHA512
ccda88f577bf9a5b0eb56a93dfbdfbb2b390aaa67dacd5d4d3e5a092bbd47b59afdc4add3f773ba5ba23ea391a00585e050257e772a3867f4450e5c9bd529c51
-
SSDEEP
24576:rKfpliz6dapqNNEZ2XIgt/BrHiIdheaowhvc+N2UVs9/fAuf6NG:rKfpYONE01xlo/U+lAgD
Static task
static1
Behavioral task
behavioral1
Sample
ab45a821c176a0387239da0e5d1e393d_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
ab45a821c176a0387239da0e5d1e393d_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
ab45a821c176a0387239da0e5d1e393d_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
ab45a821c176a0387239da0e5d1e393d_JaffaCakes118
-
Size
842KB
-
MD5
ab45a821c176a0387239da0e5d1e393d
-
SHA1
1084fbb0b32def2403b103fc4e7b8fc59d847a23
-
SHA256
ee8d3e1f2a401d454616899b4ea0e2013e32770d3367aa8ef2bdcfec8c8f085b
-
SHA512
ccda88f577bf9a5b0eb56a93dfbdfbb2b390aaa67dacd5d4d3e5a092bbd47b59afdc4add3f773ba5ba23ea391a00585e050257e772a3867f4450e5c9bd529c51
-
SSDEEP
24576:rKfpliz6dapqNNEZ2XIgt/BrHiIdheaowhvc+N2UVs9/fAuf6NG:rKfpYONE01xlo/U+lAgD
-
Checks Android system properties for emulator presence.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the phone number (MSISDN for GSM devices)
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-