General
-
Target
4b61749e9f76b1161c87200a079ff3c1_JaffaCakes118
-
Size
901KB
-
Sample
241016-e1dslswgkp
-
MD5
4b61749e9f76b1161c87200a079ff3c1
-
SHA1
1355b7d361023cde77654c80bc49f2d672bb374d
-
SHA256
efe9a312cca9f2581932cf2a3b53b278435ce4aebe57be5281c9b1bf8e84f373
-
SHA512
9013d13c8b0a2c3532efc0b132a81308fd650c70ab162aefb6fe22fe3873967de16cf72fdcb30b251c752529c9ab2c0402e1301ace24e9517a36f73120a64c5a
-
SSDEEP
12288:bGWzszq7SWaGRcVb7AXh2oRjyOifSiRZ/sY1PK9g5n/y+86qarlkyLpMvEqucbtm:qzpGwAx2oRjF5i4TYlxJmgHwl52j
Static task
static1
Behavioral task
behavioral1
Sample
4b61749e9f76b1161c87200a079ff3c1_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
4b61749e9f76b1161c87200a079ff3c1_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
4b61749e9f76b1161c87200a079ff3c1_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
4b61749e9f76b1161c87200a079ff3c1_JaffaCakes118
-
Size
901KB
-
MD5
4b61749e9f76b1161c87200a079ff3c1
-
SHA1
1355b7d361023cde77654c80bc49f2d672bb374d
-
SHA256
efe9a312cca9f2581932cf2a3b53b278435ce4aebe57be5281c9b1bf8e84f373
-
SHA512
9013d13c8b0a2c3532efc0b132a81308fd650c70ab162aefb6fe22fe3873967de16cf72fdcb30b251c752529c9ab2c0402e1301ace24e9517a36f73120a64c5a
-
SSDEEP
12288:bGWzszq7SWaGRcVb7AXh2oRjyOifSiRZ/sY1PK9g5n/y+86qarlkyLpMvEqucbtm:qzpGwAx2oRjF5i4TYlxJmgHwl52j
-
Checks Android system properties for emulator presence.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Requests dangerous framework permissions
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1Suppress Application Icon
1Virtualization/Sandbox Evasion
3System Checks
3