General
-
Target
3a522ac5e008761620d35993c1532df3_JaffaCakes118
-
Size
10.8MB
-
Sample
241012-qy6amaxfrr
-
MD5
3a522ac5e008761620d35993c1532df3
-
SHA1
ea9428e6393fcbcf4edc98d97315076397285fe3
-
SHA256
502c9d80e9160e4642b9ec4862af9560e7b733c09a8e5f09fe7539f2d27b031c
-
SHA512
5ef6f35abc3fcc429fd07bdb5c28cb5d4a34f790e8923639e493a614f678dcab68c8f5d08a3340fba8042ff9632da867d520689f65f1623b5af4e422f546975e
-
SSDEEP
196608:ksq4AIbApL7ocwDApWOD2lHBuWUvG6Prj5yEqM8dQLqjL3p29/OL3p29/2CkL:QCypW6aBRWPrt3md7jL30OL30qL
Static task
static1
Behavioral task
behavioral1
Sample
3a522ac5e008761620d35993c1532df3_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
3a522ac5e008761620d35993c1532df3_JaffaCakes118.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
3a522ac5e008761620d35993c1532df3_JaffaCakes118
-
Size
10.8MB
-
MD5
3a522ac5e008761620d35993c1532df3
-
SHA1
ea9428e6393fcbcf4edc98d97315076397285fe3
-
SHA256
502c9d80e9160e4642b9ec4862af9560e7b733c09a8e5f09fe7539f2d27b031c
-
SHA512
5ef6f35abc3fcc429fd07bdb5c28cb5d4a34f790e8923639e493a614f678dcab68c8f5d08a3340fba8042ff9632da867d520689f65f1623b5af4e422f546975e
-
SSDEEP
196608:ksq4AIbApL7ocwDApWOD2lHBuWUvG6Prj5yEqM8dQLqjL3p29/OL3p29/2CkL:QCypW6aBRWPrt3md7jL30OL30qL
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-