General
-
Target
8b130385cce050315b3017b2bc660aa2_JaffaCakes118
-
Size
21.4MB
-
Sample
240811-tttyks1gme
-
MD5
8b130385cce050315b3017b2bc660aa2
-
SHA1
8ea4c10721c6d48fa43d098121338db89e721175
-
SHA256
f1518b0f933fd2c8db11462eb750e37fd43c4fbb782184c162abc26fd0de130a
-
SHA512
c8e6e7f91d15f1bf5acf23906ac20e69908d17e32c048220cc8289506fca8d81d874d4180e6f791fe75875dd29b74bf83fcf5c602948dfe3a9a7f5be217867a4
-
SSDEEP
393216:mxtLywlVMZHMNxrmUs6tzdKoy5JBS7oPotNjQsMRmYEAST7wGUv:y7lVMZMXr/th4HBhotd37w1
Static task
static1
Behavioral task
behavioral1
Sample
8b130385cce050315b3017b2bc660aa2_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
8b130385cce050315b3017b2bc660aa2_JaffaCakes118.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
8b130385cce050315b3017b2bc660aa2_JaffaCakes118
-
Size
21.4MB
-
MD5
8b130385cce050315b3017b2bc660aa2
-
SHA1
8ea4c10721c6d48fa43d098121338db89e721175
-
SHA256
f1518b0f933fd2c8db11462eb750e37fd43c4fbb782184c162abc26fd0de130a
-
SHA512
c8e6e7f91d15f1bf5acf23906ac20e69908d17e32c048220cc8289506fca8d81d874d4180e6f791fe75875dd29b74bf83fcf5c602948dfe3a9a7f5be217867a4
-
SSDEEP
393216:mxtLywlVMZHMNxrmUs6tzdKoy5JBS7oPotNjQsMRmYEAST7wGUv:y7lVMZMXr/th4HBhotd37w1
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-