General
-
Target
d4d4caa2afbcb1201db744cb8895fc84_JaffaCakes118
-
Size
3.0MB
-
Sample
240908-vd57caxaqj
-
MD5
d4d4caa2afbcb1201db744cb8895fc84
-
SHA1
754cef10c46568d3821ebbbcd67e78309e226a3e
-
SHA256
9877e775dd2a9c36618a99c28a5f7533baf013591f83098d960b44f8c9abc817
-
SHA512
eeee05f4cf2636e43ceb86b2f06360b87c4ce4bde696054404f48258bc55f83622ab281017624055ba6430a8831c1dd6254d83b83c50c5aaed52b2b5901d6443
-
SSDEEP
49152:C3gyk6gV3GZOM2IaS8xb0e7qtDXFeF3x6/pQLXlObl15kiA9a/OEy5FRjWU:CwyVgtzM2Ide7ODXFY3xQ6Eas/QRjb
Static task
static1
Behavioral task
behavioral1
Sample
d4d4caa2afbcb1201db744cb8895fc84_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
d4d4caa2afbcb1201db744cb8895fc84_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
d4d4caa2afbcb1201db744cb8895fc84_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
d4d4caa2afbcb1201db744cb8895fc84_JaffaCakes118
-
Size
3.0MB
-
MD5
d4d4caa2afbcb1201db744cb8895fc84
-
SHA1
754cef10c46568d3821ebbbcd67e78309e226a3e
-
SHA256
9877e775dd2a9c36618a99c28a5f7533baf013591f83098d960b44f8c9abc817
-
SHA512
eeee05f4cf2636e43ceb86b2f06360b87c4ce4bde696054404f48258bc55f83622ab281017624055ba6430a8831c1dd6254d83b83c50c5aaed52b2b5901d6443
-
SSDEEP
49152:C3gyk6gV3GZOM2IaS8xb0e7qtDXFeF3x6/pQLXlObl15kiA9a/OEy5FRjWU:CwyVgtzM2Ide7ODXFY3xQ6Eas/QRjb
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Checks the presence of a debugger
-