General
-
Target
c81f9a49de343163bef53ea8c7a28ef0_JaffaCakes118
-
Size
1.9MB
-
Sample
240829-dlntla1bjg
-
MD5
c81f9a49de343163bef53ea8c7a28ef0
-
SHA1
85419fcbddc7afea447dbd96ba45628afa3c6c77
-
SHA256
4a83f5f1f050288612346573a19d4f1bc9533e51a810dafe171f9d1968b1a6a9
-
SHA512
519daf7dbe72bc7340b8484b3477e13f106aebbb589b92b8c0a823ca378b773c2c8698d7e25595e50ddfd598da4956ef29d321fa772cb2e9a702eed61d01ffa6
-
SSDEEP
49152:mzZZzRL3FzfztVieUWsm1KZChcQ4AibbiouaNe:mPzRL3FTzcWR1Q2c+YbIak
Static task
static1
Behavioral task
behavioral1
Sample
c81f9a49de343163bef53ea8c7a28ef0_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
c81f9a49de343163bef53ea8c7a28ef0_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
c81f9a49de343163bef53ea8c7a28ef0_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
c81f9a49de343163bef53ea8c7a28ef0_JaffaCakes118
-
Size
1.9MB
-
MD5
c81f9a49de343163bef53ea8c7a28ef0
-
SHA1
85419fcbddc7afea447dbd96ba45628afa3c6c77
-
SHA256
4a83f5f1f050288612346573a19d4f1bc9533e51a810dafe171f9d1968b1a6a9
-
SHA512
519daf7dbe72bc7340b8484b3477e13f106aebbb589b92b8c0a823ca378b773c2c8698d7e25595e50ddfd598da4956ef29d321fa772cb2e9a702eed61d01ffa6
-
SSDEEP
49152:mzZZzRL3FzfztVieUWsm1KZChcQ4AibbiouaNe:mPzRL3FTzcWR1Q2c+YbIak
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-