General
-
Target
4929c66b68bc3d1d820447d53633489c_JaffaCakes118
-
Size
2.8MB
-
Sample
241015-waklxaxgka
-
MD5
4929c66b68bc3d1d820447d53633489c
-
SHA1
1c62877dadd08e7a729ac899f5135df49ddb6c54
-
SHA256
981fd9a99b224aefb4114e34cb3b48960310f0c19faf633befc44fbf40623dac
-
SHA512
09434784b106f54e74db74a8adcaf9c5a73357e9c01603423b63cf13d72fbe0e8ee5314cea1e0650ec75db31b1b2ada91d55bf843362644583f1b3651e9c8c67
-
SSDEEP
49152:uPpsBnPFA2bKW9GbYUGDH7dhJlth7NcuRphXF6AKv5igsK3rAbcNQVi3jFf62NZ5:uPpMtAZmEPGD7xl1cqhXF6AKv33rAQNP
Static task
static1
Behavioral task
behavioral1
Sample
4929c66b68bc3d1d820447d53633489c_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
4929c66b68bc3d1d820447d53633489c_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
4929c66b68bc3d1d820447d53633489c_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
4929c66b68bc3d1d820447d53633489c_JaffaCakes118
-
Size
2.8MB
-
MD5
4929c66b68bc3d1d820447d53633489c
-
SHA1
1c62877dadd08e7a729ac899f5135df49ddb6c54
-
SHA256
981fd9a99b224aefb4114e34cb3b48960310f0c19faf633befc44fbf40623dac
-
SHA512
09434784b106f54e74db74a8adcaf9c5a73357e9c01603423b63cf13d72fbe0e8ee5314cea1e0650ec75db31b1b2ada91d55bf843362644583f1b3651e9c8c67
-
SSDEEP
49152:uPpsBnPFA2bKW9GbYUGDH7dhJlth7NcuRphXF6AKv5igsK3rAbcNQVi3jFf62NZ5:uPpMtAZmEPGD7xl1cqhXF6AKv33rAQNP
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-