General
-
Target
b025f24033e138931d84398996391841_JaffaCakes118
-
Size
14.6MB
-
Sample
240615-z71aeavdka
-
MD5
b025f24033e138931d84398996391841
-
SHA1
3d42a8b74c5227e0c24ecbdcf51f56a37844a54f
-
SHA256
4325021b1818300acdde4c4c7141b20ea3c3a114fc650f4eac6c8eb120da7493
-
SHA512
543273cd70adb82050e64a8e3ae5be5da243aac6ebb40ceab31185065d244eb5ef6501ca9f19de633d8101b2ad1afe37e970918b3ca9e3023b2e0eb21c1abfd3
-
SSDEEP
393216:utdx9zwKA3pI94O6XaSOLQtqOWcZ11TvcZ52xXl:mdxOKZaOSNTvcZ4xXl
Static task
static1
Behavioral task
behavioral1
Sample
b025f24033e138931d84398996391841_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
b025f24033e138931d84398996391841_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
b025f24033e138931d84398996391841_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
b025f24033e138931d84398996391841_JaffaCakes118
-
Size
14.6MB
-
MD5
b025f24033e138931d84398996391841
-
SHA1
3d42a8b74c5227e0c24ecbdcf51f56a37844a54f
-
SHA256
4325021b1818300acdde4c4c7141b20ea3c3a114fc650f4eac6c8eb120da7493
-
SHA512
543273cd70adb82050e64a8e3ae5be5da243aac6ebb40ceab31185065d244eb5ef6501ca9f19de633d8101b2ad1afe37e970918b3ca9e3023b2e0eb21c1abfd3
-
SSDEEP
393216:utdx9zwKA3pI94O6XaSOLQtqOWcZ11TvcZ52xXl:mdxOKZaOSNTvcZ4xXl
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Queries the mobile country code (MCC)
-
Listens for changes in the sensor environment (might be used to detect emulation)
-