General
-
Target
b7a4dc47cedaa2a40454c347efa2b4c4_JaffaCakes118
-
Size
4.8MB
-
Sample
240617-kcj8dasdrb
-
MD5
b7a4dc47cedaa2a40454c347efa2b4c4
-
SHA1
f6258dfb8863d9c170626438d8fc85b72f683fb8
-
SHA256
3832a93407b2708dc8eda0b38e03180a26632309425e2cb929bbf9c95f551edc
-
SHA512
da866a3769456691e9761739c5548e9c9ff54df118da4767544fbc8abb1798fe24edbb0c8a5897d04fbf35d883e47a782f4dff4bc81fa9caa24a391d10a746ca
-
SSDEEP
98304:v19SltVJ2CJ4fMIcaGsIDvl6qWQKTtS4eeyGIMLDBGQqwgbFo8D4iCmOP:92iArtss96qf4eeyGIeBGQqbBo8Dsmo
Static task
static1
Behavioral task
behavioral1
Sample
b7a4dc47cedaa2a40454c347efa2b4c4_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
b7a4dc47cedaa2a40454c347efa2b4c4_JaffaCakes118
-
Size
4.8MB
-
MD5
b7a4dc47cedaa2a40454c347efa2b4c4
-
SHA1
f6258dfb8863d9c170626438d8fc85b72f683fb8
-
SHA256
3832a93407b2708dc8eda0b38e03180a26632309425e2cb929bbf9c95f551edc
-
SHA512
da866a3769456691e9761739c5548e9c9ff54df118da4767544fbc8abb1798fe24edbb0c8a5897d04fbf35d883e47a782f4dff4bc81fa9caa24a391d10a746ca
-
SSDEEP
98304:v19SltVJ2CJ4fMIcaGsIDvl6qWQKTtS4eeyGIMLDBGQqwgbFo8D4iCmOP:92iArtss96qf4eeyGIeBGQqbBo8Dsmo
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-