General
-
Target
b741d2b6745db00def2922e779d2b0bf_JaffaCakes118
-
Size
615KB
-
Sample
240617-hjn4sssgrp
-
MD5
b741d2b6745db00def2922e779d2b0bf
-
SHA1
1298ed5ce8e48405a9a3c566c756d7344d9e305a
-
SHA256
56d17dc249dabe1340986351f636daddd96eb649e0e05f30d265d4a33e9c9246
-
SHA512
f482276cf8a369b1110773731726601056662680f68330ec991ab3b554d6efeac5208dc6d2edf91d323a80d1ed08ca0759e4599991fbc7f42753b70dcd71e9be
-
SSDEEP
12288:9DrVLy7/yNALXxOUDs/Lp6uN38NDFTIKn1MQWnA+Rhffmdare:9DBLyqNALkbTh+5FTJ+REP
Static task
static1
Behavioral task
behavioral1
Sample
b741d2b6745db00def2922e779d2b0bf_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
b741d2b6745db00def2922e779d2b0bf_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
b741d2b6745db00def2922e779d2b0bf_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
b741d2b6745db00def2922e779d2b0bf_JaffaCakes118
-
Size
615KB
-
MD5
b741d2b6745db00def2922e779d2b0bf
-
SHA1
1298ed5ce8e48405a9a3c566c756d7344d9e305a
-
SHA256
56d17dc249dabe1340986351f636daddd96eb649e0e05f30d265d4a33e9c9246
-
SHA512
f482276cf8a369b1110773731726601056662680f68330ec991ab3b554d6efeac5208dc6d2edf91d323a80d1ed08ca0759e4599991fbc7f42753b70dcd71e9be
-
SSDEEP
12288:9DrVLy7/yNALXxOUDs/Lp6uN38NDFTIKn1MQWnA+Rhffmdare:9DBLyqNALkbTh+5FTJ+REP
-
Checks Android system properties for emulator presence.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-