General
-
Target
b7a79e295f23fb51105282797d05d8f7_JaffaCakes118
-
Size
2.9MB
-
Sample
240617-kdyr6asepf
-
MD5
b7a79e295f23fb51105282797d05d8f7
-
SHA1
1de4a6a4395a45d6c1ec1c67cd27720ae9708034
-
SHA256
3cd3be87d40527570990878436a0356c46ea0ce7c4d7a6b499a22bad56672ebf
-
SHA512
766bbe6b46122f317dd0f7ccf2fb6f881dcb8967fc8b22e7338adf36868c2d3a3831a04667b1a06334e5ad1f529fa470546d17c98cdb33e7caebc702b38b3820
-
SSDEEP
49152:iR9UR+nc3kqu1NhspkEqctCh+kv6m6yROX9jBczVbkge8axsRG/815LYgduVjdVV:iR9UR+n4kq0okh+M622atVaxswKYgsVB
Static task
static1
Behavioral task
behavioral1
Sample
b7a79e295f23fb51105282797d05d8f7_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
b7a79e295f23fb51105282797d05d8f7_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
b7a79e295f23fb51105282797d05d8f7_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
b7a79e295f23fb51105282797d05d8f7_JaffaCakes118
-
Size
2.9MB
-
MD5
b7a79e295f23fb51105282797d05d8f7
-
SHA1
1de4a6a4395a45d6c1ec1c67cd27720ae9708034
-
SHA256
3cd3be87d40527570990878436a0356c46ea0ce7c4d7a6b499a22bad56672ebf
-
SHA512
766bbe6b46122f317dd0f7ccf2fb6f881dcb8967fc8b22e7338adf36868c2d3a3831a04667b1a06334e5ad1f529fa470546d17c98cdb33e7caebc702b38b3820
-
SSDEEP
49152:iR9UR+nc3kqu1NhspkEqctCh+kv6m6yROX9jBczVbkge8axsRG/815LYgduVjdVV:iR9UR+n4kq0okh+M622atVaxswKYgsVB
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Checks the presence of a debugger
-