General
-
Target
ab3a63bfefc225c181656ea8ee256264_JaffaCakes118
-
Size
6.5MB
-
Sample
240614-ys4hvateqa
-
MD5
ab3a63bfefc225c181656ea8ee256264
-
SHA1
ec6ee1d91d88a9a9fc1e765772b23663de4ad5ff
-
SHA256
0cd1d6042f0ef661f9cbd9238b699ff1bde5d249db169a26555543515f3d64c9
-
SHA512
3a76adc6bdc6e55d4190d00f6e9cb95dc2879c7798541eeaf9421ade6474fb6fc0d8a07ee36af04c32ba3e325b83ec71346f448f4413834d377f7863ba2d1c85
-
SSDEEP
196608:fElsAkmmXElD9LqsjdeHGODM9qCQtHwuiwzjyoDfS0e5IU7UcndllzVeXXkHbYUA:fElsAkmmXeDd9oHjxXyov
Static task
static1
Behavioral task
behavioral1
Sample
ab3a63bfefc225c181656ea8ee256264_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
ab3a63bfefc225c181656ea8ee256264_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
ab3a63bfefc225c181656ea8ee256264_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
ab3a63bfefc225c181656ea8ee256264_JaffaCakes118
-
Size
6.5MB
-
MD5
ab3a63bfefc225c181656ea8ee256264
-
SHA1
ec6ee1d91d88a9a9fc1e765772b23663de4ad5ff
-
SHA256
0cd1d6042f0ef661f9cbd9238b699ff1bde5d249db169a26555543515f3d64c9
-
SHA512
3a76adc6bdc6e55d4190d00f6e9cb95dc2879c7798541eeaf9421ade6474fb6fc0d8a07ee36af04c32ba3e325b83ec71346f448f4413834d377f7863ba2d1c85
-
SSDEEP
196608:fElsAkmmXElD9LqsjdeHGODM9qCQtHwuiwzjyoDfS0e5IU7UcndllzVeXXkHbYUA:fElsAkmmXeDd9oHjxXyov
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Checks the presence of a debugger
-