General
-
Target
b14fad547984de081de6aa0826b546c5_JaffaCakes118
-
Size
4.1MB
-
Sample
240616-ct1yfswaqb
-
MD5
b14fad547984de081de6aa0826b546c5
-
SHA1
0079b0570b3a91bf7c939d8d4c6f32032556a74d
-
SHA256
dd1ecdb56a4f165a2de8e43308371cd743141a1a9dd1596d642c31dc522ee622
-
SHA512
a32c93f0a8f8e22a1a361ef89d492e7fb1055d1a7bdb2a5104acc7b9bf4c80af74d56d916972755b010f9712d9336705b4ab181c1813d782d17b9171f179f234
-
SSDEEP
98304:Hd1LrSifve6Msp9QFlEnFcvTPKhfaYGNs5:H7HZzM+9jFcrP6faq5
Static task
static1
Behavioral task
behavioral1
Sample
b14fad547984de081de6aa0826b546c5_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
b14fad547984de081de6aa0826b546c5_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Malware Config
Targets
-
-
Target
b14fad547984de081de6aa0826b546c5_JaffaCakes118
-
Size
4.1MB
-
MD5
b14fad547984de081de6aa0826b546c5
-
SHA1
0079b0570b3a91bf7c939d8d4c6f32032556a74d
-
SHA256
dd1ecdb56a4f165a2de8e43308371cd743141a1a9dd1596d642c31dc522ee622
-
SHA512
a32c93f0a8f8e22a1a361ef89d492e7fb1055d1a7bdb2a5104acc7b9bf4c80af74d56d916972755b010f9712d9336705b4ab181c1813d782d17b9171f179f234
-
SSDEEP
98304:Hd1LrSifve6Msp9QFlEnFcvTPKhfaYGNs5:H7HZzM+9jFcrP6faq5
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-