General
-
Target
4992cb7c8158830a16fd47b8243988f1_JaffaCakes118
-
Size
549KB
-
Sample
241015-x2qsnswfqp
-
MD5
4992cb7c8158830a16fd47b8243988f1
-
SHA1
291501e76d9081aaa22f3212e3c2fce6bbd09308
-
SHA256
dd9243ac560fccca43dca5b93e2121a95e9a33bb7394a5af8464f9a76a69162d
-
SHA512
443c0bb2c4de2445c345e7ec4138c0ddb04beeada28586db5d52882d9b6b84685a067e02f59676ac649b2ac9316dc3e3b4072a1fa808ff55fae526475dccca07
-
SSDEEP
12288:L9fnxozeoj7WWYQeEbr+2683sz2RuLApsn0GK:xfxozeo3WWYQlq26L2Ruus01
Static task
static1
Behavioral task
behavioral1
Sample
4992cb7c8158830a16fd47b8243988f1_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
4992cb7c8158830a16fd47b8243988f1_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
4992cb7c8158830a16fd47b8243988f1_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
4992cb7c8158830a16fd47b8243988f1_JaffaCakes118
-
Size
549KB
-
MD5
4992cb7c8158830a16fd47b8243988f1
-
SHA1
291501e76d9081aaa22f3212e3c2fce6bbd09308
-
SHA256
dd9243ac560fccca43dca5b93e2121a95e9a33bb7394a5af8464f9a76a69162d
-
SHA512
443c0bb2c4de2445c345e7ec4138c0ddb04beeada28586db5d52882d9b6b84685a067e02f59676ac649b2ac9316dc3e3b4072a1fa808ff55fae526475dccca07
-
SSDEEP
12288:L9fnxozeoj7WWYQeEbr+2683sz2RuLApsn0GK:xfxozeo3WWYQlq26L2Ruus01
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-