General
-
Target
da3173009b85442122927b50567a2b3d_JaffaCakes118
-
Size
4.8MB
-
Sample
240911-m3gahsxbrh
-
MD5
da3173009b85442122927b50567a2b3d
-
SHA1
986c2b653926c542c2350ea9a13e297892752b53
-
SHA256
629ac13774ea6864e9c9927b8998b563cbdb31dd5704dbed6747503a8cdd916c
-
SHA512
6544e7f007e4953b0b009127796c2bc392b73ed23f17d58d8a4b0731d4c370c7df1125dd148356edb562e76464df383b3f48b363029505105a1af882a544b70f
-
SSDEEP
98304:g5YqfkQM/RgHjEyJvO0pMiLeNWQ0VNn020dd0JYu7F32otPs/9apLdnmgk:SfE5gAkvjmiqNJ2N0ty9F3nmApL8L
Behavioral task
behavioral1
Sample
da3173009b85442122927b50567a2b3d_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
da3173009b85442122927b50567a2b3d_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
da3173009b85442122927b50567a2b3d_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
da3173009b85442122927b50567a2b3d_JaffaCakes118
-
Size
4.8MB
-
MD5
da3173009b85442122927b50567a2b3d
-
SHA1
986c2b653926c542c2350ea9a13e297892752b53
-
SHA256
629ac13774ea6864e9c9927b8998b563cbdb31dd5704dbed6747503a8cdd916c
-
SHA512
6544e7f007e4953b0b009127796c2bc392b73ed23f17d58d8a4b0731d4c370c7df1125dd148356edb562e76464df383b3f48b363029505105a1af882a544b70f
-
SSDEEP
98304:g5YqfkQM/RgHjEyJvO0pMiLeNWQ0VNn020dd0JYu7F32otPs/9apLdnmgk:SfE5gAkvjmiqNJ2N0ty9F3nmApL8L
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
2System Checks
2