General
-
Target
740942ed1622aff27b7e3224d808fdca_JaffaCakes118
-
Size
25.7MB
-
Sample
240726-pj1adsxcnm
-
MD5
740942ed1622aff27b7e3224d808fdca
-
SHA1
01fe7b08710b7e05ce3915e0c6a4306993a2d3b0
-
SHA256
2273b885128a18eeb87a55958048c03816a750664383cb550ea3095446f8ce28
-
SHA512
9cfa0720ff7e24384267dca9dd8f69dd8ed1c8edfff366aeaa343c271576e322e2f71654cc078539b0fdafe6ad58b8939f29962cc6ddca158efd72056749c20a
-
SSDEEP
786432:A5edry69S+/imXQewZLaPbX99cLo9OAcshT5vRb:A4VN9BamcOv8o9OJ2tF
Static task
static1
Behavioral task
behavioral1
Sample
740942ed1622aff27b7e3224d808fdca_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
740942ed1622aff27b7e3224d808fdca_JaffaCakes118.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
740942ed1622aff27b7e3224d808fdca_JaffaCakes118
-
Size
25.7MB
-
MD5
740942ed1622aff27b7e3224d808fdca
-
SHA1
01fe7b08710b7e05ce3915e0c6a4306993a2d3b0
-
SHA256
2273b885128a18eeb87a55958048c03816a750664383cb550ea3095446f8ce28
-
SHA512
9cfa0720ff7e24384267dca9dd8f69dd8ed1c8edfff366aeaa343c271576e322e2f71654cc078539b0fdafe6ad58b8939f29962cc6ddca158efd72056749c20a
-
SSDEEP
786432:A5edry69S+/imXQewZLaPbX99cLo9OAcshT5vRb:A4VN9BamcOv8o9OJ2tF
-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-