General
-
Target
b68f88b32b11311a1b6066fd25a2e763_JaffaCakes118
-
Size
30.9MB
-
Sample
240617-d4w8pawglk
-
MD5
b68f88b32b11311a1b6066fd25a2e763
-
SHA1
549fa4157a9e0983ef7ff120c771942e7e69e0df
-
SHA256
5f4aec9d9283f491a5ba5a0cbf448bf25de49712eef79d68044b016160b5ae7e
-
SHA512
978e6efd8c0296e85ba6e72c4031c3155c6ffd1419d130503205d5f7276690c91596abe8e71ab6f5a08e45ff99f3059bb0db24f62eac2c3571258b9b804b5c45
-
SSDEEP
786432:mX+/usfnqG/awrTlVYWT7ibLi4rtkgxGQquod3dhwJ4tigHjWZ:mu7fP/hrTleWTO/ietkgxGQq9ThwitiP
Static task
static1
Behavioral task
behavioral1
Sample
b68f88b32b11311a1b6066fd25a2e763_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
b68f88b32b11311a1b6066fd25a2e763_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
b68f88b32b11311a1b6066fd25a2e763_JaffaCakes118
-
Size
30.9MB
-
MD5
b68f88b32b11311a1b6066fd25a2e763
-
SHA1
549fa4157a9e0983ef7ff120c771942e7e69e0df
-
SHA256
5f4aec9d9283f491a5ba5a0cbf448bf25de49712eef79d68044b016160b5ae7e
-
SHA512
978e6efd8c0296e85ba6e72c4031c3155c6ffd1419d130503205d5f7276690c91596abe8e71ab6f5a08e45ff99f3059bb0db24f62eac2c3571258b9b804b5c45
-
SSDEEP
786432:mX+/usfnqG/awrTlVYWT7ibLi4rtkgxGQquod3dhwJ4tigHjWZ:mu7fP/hrTleWTO/ietkgxGQq9ThwitiP
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-