General
-
Target
b95d680b30295ba105d78066368d17af_JaffaCakes118
-
Size
27.4MB
-
Sample
240617-wy58hsshrl
-
MD5
b95d680b30295ba105d78066368d17af
-
SHA1
48552c7465f680638cd132812dacb859d0834115
-
SHA256
88bca6e017e47709376e778a2eb189c378abef84e7ab68b99348daa273d95be1
-
SHA512
d24e2d34fa9c8723ebb4d4e8add2b48504385c4134256855de2d6661f974b9d0a81b1e01032881239975ed66b30d83eabde8dc338dabb8b75507539801477a1f
-
SSDEEP
786432:gpLCmyIMJG3SUh2VvSSIfjHR65f0cQ3HSi/yTU3ECgyDt:gpLCmyIqMSUftjHRW0cCHJ/KU3ECDt
Static task
static1
Behavioral task
behavioral1
Sample
b95d680b30295ba105d78066368d17af_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
b95d680b30295ba105d78066368d17af_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
b95d680b30295ba105d78066368d17af_JaffaCakes118
-
Size
27.4MB
-
MD5
b95d680b30295ba105d78066368d17af
-
SHA1
48552c7465f680638cd132812dacb859d0834115
-
SHA256
88bca6e017e47709376e778a2eb189c378abef84e7ab68b99348daa273d95be1
-
SHA512
d24e2d34fa9c8723ebb4d4e8add2b48504385c4134256855de2d6661f974b9d0a81b1e01032881239975ed66b30d83eabde8dc338dabb8b75507539801477a1f
-
SSDEEP
786432:gpLCmyIMJG3SUh2VvSSIfjHR65f0cQ3HSi/yTU3ECgyDt:gpLCmyIqMSUftjHRW0cCHJ/KU3ECDt
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-