General
-
Target
dc58f386640698482ff631a57f32d353_JaffaCakes118
-
Size
30.8MB
-
Sample
240912-qmecrswgjf
-
MD5
dc58f386640698482ff631a57f32d353
-
SHA1
6bb74a40468f13a7557b0dbf4a24eb4361405dd5
-
SHA256
8e4004142f8197b1835b5ac999c9e81db3d3892d842c0d0f59bac7f67937093d
-
SHA512
b770306012dcaaf3cb3592c1a5c4c570c005a9f00672bde8924efd53eaba99dc593244885de01ba01e80d6172a933e34e2bf380aea3001abc6a533c246087d5c
-
SSDEEP
393216:Clz4Iiegy7izMALrC3vN5ZL5Qd1FgmgtAQ5gBUTEgtfXbJR/BJOaBwZS/4zvwZSR:CNbg4iRgCHtQyBU35B1av1aM1aA
Static task
static1
Behavioral task
behavioral1
Sample
dc58f386640698482ff631a57f32d353_JaffaCakes118.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
dc58f386640698482ff631a57f32d353_JaffaCakes118.apk
Resource
android-x64-20240910-en
Malware Config
Targets
-
-
Target
dc58f386640698482ff631a57f32d353_JaffaCakes118
-
Size
30.8MB
-
MD5
dc58f386640698482ff631a57f32d353
-
SHA1
6bb74a40468f13a7557b0dbf4a24eb4361405dd5
-
SHA256
8e4004142f8197b1835b5ac999c9e81db3d3892d842c0d0f59bac7f67937093d
-
SHA512
b770306012dcaaf3cb3592c1a5c4c570c005a9f00672bde8924efd53eaba99dc593244885de01ba01e80d6172a933e34e2bf380aea3001abc6a533c246087d5c
-
SSDEEP
393216:Clz4Iiegy7izMALrC3vN5ZL5Qd1FgmgtAQ5gBUTEgtfXbJR/BJOaBwZS/4zvwZSR:CNbg4iRgCHtQyBU35B1av1aM1aA
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-