General
-
Target
ade90179ed7e610c2a0a291fcba83fd7_JaffaCakes118
-
Size
10.5MB
-
Sample
240615-l4j75azfjr
-
MD5
ade90179ed7e610c2a0a291fcba83fd7
-
SHA1
97afbb00253bd5e2770b13683b69708d69de7017
-
SHA256
43609fa48603c1cc9af8d92aa86c4b105497abc38f73cb8fa90d5b2eab3db692
-
SHA512
80be3ec03b184134c41894df5e54c5208884f1fdd589404f8dbf77c56fba7024186f9b67b5607bf1313d79831bddcaca1912fc14d5a205adfbabbc63bddec59b
-
SSDEEP
196608:bf7KZOrr3vrLxxX8IxTHvzHamKvSMc0ub+93NFB0H9JtOYQzM9kfXlBlLseXzrR:iIff3xJ8IxvHYv7399Y0YQzH1LLVXHR
Static task
static1
Behavioral task
behavioral1
Sample
ade90179ed7e610c2a0a291fcba83fd7_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
ade90179ed7e610c2a0a291fcba83fd7_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
ade90179ed7e610c2a0a291fcba83fd7_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
ade90179ed7e610c2a0a291fcba83fd7_JaffaCakes118
-
Size
10.5MB
-
MD5
ade90179ed7e610c2a0a291fcba83fd7
-
SHA1
97afbb00253bd5e2770b13683b69708d69de7017
-
SHA256
43609fa48603c1cc9af8d92aa86c4b105497abc38f73cb8fa90d5b2eab3db692
-
SHA512
80be3ec03b184134c41894df5e54c5208884f1fdd589404f8dbf77c56fba7024186f9b67b5607bf1313d79831bddcaca1912fc14d5a205adfbabbc63bddec59b
-
SSDEEP
196608:bf7KZOrr3vrLxxX8IxTHvzHamKvSMc0ub+93NFB0H9JtOYQzM9kfXlBlLseXzrR:iIff3xJ8IxvHYv7399Y0YQzH1LLVXHR
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-