General
-
Target
bd4efb3a8a4156234deedf1fbf69f593_JaffaCakes118
-
Size
2.7MB
-
Sample
240619-t68x9syckr
-
MD5
bd4efb3a8a4156234deedf1fbf69f593
-
SHA1
2d619d4b46bea395ad059af190b34cf7701331e9
-
SHA256
0cdae26e327656437b20901b3ccf50ae32634b71168103844047077aac07fff5
-
SHA512
6271168b565bd2c98fc1bc53bcda45ce327f8315c820a20f1ac7de1988f479e2fb284933ad1f676257acdb239fe835caeddd3ec6bb38b34f942818c32482b96f
-
SSDEEP
49152:o7gyxaFeaCRcvpNL2CdlpY3kWFIXDz4HucN5s6iggjRvFn9mmUf3CGDmpnQzL:2g8VDipNL26po3KDzaN5PiggtFnkmMvH
Static task
static1
Behavioral task
behavioral1
Sample
bd4efb3a8a4156234deedf1fbf69f593_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
bd4efb3a8a4156234deedf1fbf69f593_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
bd4efb3a8a4156234deedf1fbf69f593_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
bd4efb3a8a4156234deedf1fbf69f593_JaffaCakes118
-
Size
2.7MB
-
MD5
bd4efb3a8a4156234deedf1fbf69f593
-
SHA1
2d619d4b46bea395ad059af190b34cf7701331e9
-
SHA256
0cdae26e327656437b20901b3ccf50ae32634b71168103844047077aac07fff5
-
SHA512
6271168b565bd2c98fc1bc53bcda45ce327f8315c820a20f1ac7de1988f479e2fb284933ad1f676257acdb239fe835caeddd3ec6bb38b34f942818c32482b96f
-
SSDEEP
49152:o7gyxaFeaCRcvpNL2CdlpY3kWFIXDz4HucN5s6iggjRvFn9mmUf3CGDmpnQzL:2g8VDipNL26po3KDzaN5PiggtFnkmMvH
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Listens for changes in the sensor environment (might be used to detect emulation)
-