General
-
Target
43892d15ea0cdc5eb1ee1027a916d01c_JaffaCakes118
-
Size
1.4MB
-
Sample
240713-134bya1gmd
-
MD5
43892d15ea0cdc5eb1ee1027a916d01c
-
SHA1
023722b7e8b34b11b011e73dbb07b125bc04280f
-
SHA256
11324c38c687047a3811c1897b73cbd49a631619dc8e67c75c4b458f9356e2e5
-
SHA512
5ba69f43adc1247cda4d9bf7710e2d01ae6f0879a4ea332d32f8f6d315756e87ac17eff8db590058c0099bd9c974fab3c4b2819d4a5d7b0e60fa2946074fb062
-
SSDEEP
24576:1IdTO0zkthCkEO9Hj9XcHhHYYOcr06IMRpzPpkeERzjlQJ2XhWdATNU5tC:KXYjCkEO9HpXcHhHYZYQuPpdE7LhWOa2
Static task
static1
Behavioral task
behavioral1
Sample
43892d15ea0cdc5eb1ee1027a916d01c_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
43892d15ea0cdc5eb1ee1027a916d01c_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
43892d15ea0cdc5eb1ee1027a916d01c_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
43892d15ea0cdc5eb1ee1027a916d01c_JaffaCakes118
-
Size
1.4MB
-
MD5
43892d15ea0cdc5eb1ee1027a916d01c
-
SHA1
023722b7e8b34b11b011e73dbb07b125bc04280f
-
SHA256
11324c38c687047a3811c1897b73cbd49a631619dc8e67c75c4b458f9356e2e5
-
SHA512
5ba69f43adc1247cda4d9bf7710e2d01ae6f0879a4ea332d32f8f6d315756e87ac17eff8db590058c0099bd9c974fab3c4b2819d4a5d7b0e60fa2946074fb062
-
SSDEEP
24576:1IdTO0zkthCkEO9Hj9XcHhHYYOcr06IMRpzPpkeERzjlQJ2XhWdATNU5tC:KXYjCkEO9HpXcHhHYZYQuPpdE7LhWOa2
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1Suppress Application Icon
1Virtualization/Sandbox Evasion
1System Checks
1