General
-
Target
cdf1695f91d1e1ef9479b7aefb6ee30d_JaffaCakes118
-
Size
19.1MB
-
Sample
240901-bpt4nswhqd
-
MD5
cdf1695f91d1e1ef9479b7aefb6ee30d
-
SHA1
54fb4b6536aa777a683baa6c7aa4109d723d1e9c
-
SHA256
e94c67253747673b7c71e43d300d3a09a80ea9f1323f8d692ecd55af195a8742
-
SHA512
0e35957cba3f07f223bac46774a6543e689c5183a0b241d072afa1092eaecdde11c060522dc7d60486909733b1bd09973aed9e9cde452096fd9e0b9f4b246f65
-
SSDEEP
393216:gjaHFeJzZMHK9Jk9diiVCxH276Kh2jnAoninOY0z/AugJ6JpV1L:iu8ziH2wVEH27PhOnzY70z4u+yv1L
Static task
static1
Behavioral task
behavioral1
Sample
cdf1695f91d1e1ef9479b7aefb6ee30d_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
cdf1695f91d1e1ef9479b7aefb6ee30d_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
cdf1695f91d1e1ef9479b7aefb6ee30d_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
cdf1695f91d1e1ef9479b7aefb6ee30d_JaffaCakes118
-
Size
19.1MB
-
MD5
cdf1695f91d1e1ef9479b7aefb6ee30d
-
SHA1
54fb4b6536aa777a683baa6c7aa4109d723d1e9c
-
SHA256
e94c67253747673b7c71e43d300d3a09a80ea9f1323f8d692ecd55af195a8742
-
SHA512
0e35957cba3f07f223bac46774a6543e689c5183a0b241d072afa1092eaecdde11c060522dc7d60486909733b1bd09973aed9e9cde452096fd9e0b9f4b246f65
-
SSDEEP
393216:gjaHFeJzZMHK9Jk9diiVCxH276Kh2jnAoninOY0z/AugJ6JpV1L:iu8ziH2wVEH27PhOnzY70z4u+yv1L
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-