General
-
Target
b73878418ad3228d889b4101d340b4d3_JaffaCakes118
-
Size
3.4MB
-
Sample
240617-hbgdzssepq
-
MD5
b73878418ad3228d889b4101d340b4d3
-
SHA1
9eab41ed0d1b2df676819c7b7b4c8332d842d6bf
-
SHA256
ddb76a49223ea83a4db77140ec482f9c86bd28cdbc00292c5222d4bb1dcee4da
-
SHA512
de351346c207137440e4b166155b6b69f1a687e5dc6428e58a33e26d45b0ff97aaa5ba9edf5e7ef6329498a1508d36fe1d0c907051d1a9f6f842ac60773d684d
-
SSDEEP
98304:Y6WsYH/oRV32up5/z1mP8JkcrmrI3ky2J2Vfl530hKRzDqPzUzzi:Y6WsXf2S5/zf0IDa
Static task
static1
Behavioral task
behavioral1
Sample
b73878418ad3228d889b4101d340b4d3_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
b73878418ad3228d889b4101d340b4d3_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
b73878418ad3228d889b4101d340b4d3_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
b73878418ad3228d889b4101d340b4d3_JaffaCakes118
-
Size
3.4MB
-
MD5
b73878418ad3228d889b4101d340b4d3
-
SHA1
9eab41ed0d1b2df676819c7b7b4c8332d842d6bf
-
SHA256
ddb76a49223ea83a4db77140ec482f9c86bd28cdbc00292c5222d4bb1dcee4da
-
SHA512
de351346c207137440e4b166155b6b69f1a687e5dc6428e58a33e26d45b0ff97aaa5ba9edf5e7ef6329498a1508d36fe1d0c907051d1a9f6f842ac60773d684d
-
SSDEEP
98304:Y6WsYH/oRV32up5/z1mP8JkcrmrI3ky2J2Vfl530hKRzDqPzUzzi:Y6WsXf2S5/zf0IDa
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-