General
-
Target
2dee1d37cef288fc6a65769eb2f42df0_JaffaCakes118
-
Size
2.8MB
-
Sample
241009-kdt4zatala
-
MD5
2dee1d37cef288fc6a65769eb2f42df0
-
SHA1
c19fd641ad5cc8c6f5d4cb75a4889878697b7ba1
-
SHA256
cc4c3f179f4171ad5d3532602b03fe99ba06726efe544c60e3168c75d3e1f244
-
SHA512
fc72cfff3bb18419c67dc3c1a692204f73d7dc5db8caf077bd8fe202b65ea1277fe93aefc13d892cc795467bff7e8b607ea85f8773a8179aaec8d8d17c5f1ec1
-
SSDEEP
49152:dXpsBnPFA2bKW9GbYUGDH7dhJlth7NcuRphXF6AKv5igsK3rAbcNQVi3jFf62NZn:dXpMtAZmEPGD7xl1cqhXF6AKv33rAQN5
Static task
static1
Behavioral task
behavioral1
Sample
2dee1d37cef288fc6a65769eb2f42df0_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
2dee1d37cef288fc6a65769eb2f42df0_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
2dee1d37cef288fc6a65769eb2f42df0_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
2dee1d37cef288fc6a65769eb2f42df0_JaffaCakes118
-
Size
2.8MB
-
MD5
2dee1d37cef288fc6a65769eb2f42df0
-
SHA1
c19fd641ad5cc8c6f5d4cb75a4889878697b7ba1
-
SHA256
cc4c3f179f4171ad5d3532602b03fe99ba06726efe544c60e3168c75d3e1f244
-
SHA512
fc72cfff3bb18419c67dc3c1a692204f73d7dc5db8caf077bd8fe202b65ea1277fe93aefc13d892cc795467bff7e8b607ea85f8773a8179aaec8d8d17c5f1ec1
-
SSDEEP
49152:dXpsBnPFA2bKW9GbYUGDH7dhJlth7NcuRphXF6AKv5igsK3rAbcNQVi3jFf62NZn:dXpMtAZmEPGD7xl1cqhXF6AKv33rAQN5
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-