General
-
Target
ade90867708b001d1c0e97b49f81062c_JaffaCakes118
-
Size
17.8MB
-
Sample
240615-l4qd5szfkk
-
MD5
ade90867708b001d1c0e97b49f81062c
-
SHA1
c6b1cd8f6c980e69f050206635006cd9ee900315
-
SHA256
65fdae982d5a381671cdf7822d3459c5b07f8f25381c8ab4db8df111472306d8
-
SHA512
97de87c0690855b105eca6aee35682a2c1c964db4fa513ad778618b5c55d2fd48f54c08fad5864cae0bbaee8f29c6577841bddc23242eadfd9098cc343e0138c
-
SSDEEP
196608:MDJk3So+kJP3uPjBk7cCeFgjF+S5cZU5OHPvTmN97QdI99Ryq/aLz:MD63CNdTFWISC7PSN97QdILwqyLz
Static task
static1
Behavioral task
behavioral1
Sample
ade90867708b001d1c0e97b49f81062c_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
ade90867708b001d1c0e97b49f81062c_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
ade90867708b001d1c0e97b49f81062c_JaffaCakes118
-
Size
17.8MB
-
MD5
ade90867708b001d1c0e97b49f81062c
-
SHA1
c6b1cd8f6c980e69f050206635006cd9ee900315
-
SHA256
65fdae982d5a381671cdf7822d3459c5b07f8f25381c8ab4db8df111472306d8
-
SHA512
97de87c0690855b105eca6aee35682a2c1c964db4fa513ad778618b5c55d2fd48f54c08fad5864cae0bbaee8f29c6577841bddc23242eadfd9098cc343e0138c
-
SSDEEP
196608:MDJk3So+kJP3uPjBk7cCeFgjF+S5cZU5OHPvTmN97QdI99Ryq/aLz:MD63CNdTFWISC7PSN97QdILwqyLz
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-