General
-
Target
bd3bc11db46364f4c652119750137982_JaffaCakes118
-
Size
4.2MB
-
Sample
240823-1dsh5szeqk
-
MD5
bd3bc11db46364f4c652119750137982
-
SHA1
460db596ca3e5a164d9b1a117d96773e06d00d9c
-
SHA256
39aea88a014e0aaf2b1ab24a4eec733f635b33d35db363daf0813750480407bd
-
SHA512
0cfbcb894e2a259490711f39e89b3ef9f96ed1201113526149f00c892402eee83ad76d7543a78ebf77bb294ae84d0f8ce4ba32880118e4b86aa289d8057068e7
-
SSDEEP
98304:zU2nTfAEwzbJ4NAkmNf/By/b9GQyd74FVqoxJ2BO:zU2nzA34NU9/EpJC4FV3J2BO
Behavioral task
behavioral1
Sample
bd3bc11db46364f4c652119750137982_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
bd3bc11db46364f4c652119750137982_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
bd3bc11db46364f4c652119750137982_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
bd3bc11db46364f4c652119750137982_JaffaCakes118
-
Size
4.2MB
-
MD5
bd3bc11db46364f4c652119750137982
-
SHA1
460db596ca3e5a164d9b1a117d96773e06d00d9c
-
SHA256
39aea88a014e0aaf2b1ab24a4eec733f635b33d35db363daf0813750480407bd
-
SHA512
0cfbcb894e2a259490711f39e89b3ef9f96ed1201113526149f00c892402eee83ad76d7543a78ebf77bb294ae84d0f8ce4ba32880118e4b86aa289d8057068e7
-
SSDEEP
98304:zU2nTfAEwzbJ4NAkmNf/By/b9GQyd74FVqoxJ2BO:zU2nzA34NU9/EpJC4FV3J2BO
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
2System Checks
2