General
-
Target
c2315ea0e4fb893b62c2422c7f3e689d_JaffaCakes118
-
Size
2.6MB
-
Sample
240826-d1hacssdpa
-
MD5
c2315ea0e4fb893b62c2422c7f3e689d
-
SHA1
de1c0a58bcd6a308d3c0367ffe6a2353b0796157
-
SHA256
ab59dacca4c6ece8264a478495ddb51dcaa8a262cbd042a0d22d7b112cdf20ba
-
SHA512
ffccc621dd65f8794b97b4023cf52ebe7c46d6709adc138c0009d79434a0642ade3d1a7147b5f8b10b49c2a7cd50beb98ba0f22ecb73be23639e0f0cd13ddf77
-
SSDEEP
49152:ul0IRxYYX308GuRHyP4x5jyfZ2dqLG60/undmDVGTu4HjO:u9R+YnfVJe4HyfYkV0EmDmu4K
Static task
static1
Behavioral task
behavioral1
Sample
c2315ea0e4fb893b62c2422c7f3e689d_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
c2315ea0e4fb893b62c2422c7f3e689d_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
c2315ea0e4fb893b62c2422c7f3e689d_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
c2315ea0e4fb893b62c2422c7f3e689d_JaffaCakes118
-
Size
2.6MB
-
MD5
c2315ea0e4fb893b62c2422c7f3e689d
-
SHA1
de1c0a58bcd6a308d3c0367ffe6a2353b0796157
-
SHA256
ab59dacca4c6ece8264a478495ddb51dcaa8a262cbd042a0d22d7b112cdf20ba
-
SHA512
ffccc621dd65f8794b97b4023cf52ebe7c46d6709adc138c0009d79434a0642ade3d1a7147b5f8b10b49c2a7cd50beb98ba0f22ecb73be23639e0f0cd13ddf77
-
SSDEEP
49152:ul0IRxYYX308GuRHyP4x5jyfZ2dqLG60/undmDVGTu4HjO:u9R+YnfVJe4HyfYkV0EmDmu4K
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries the mobile country code (MCC)
-