General
-
Target
6ff3bdae7667c0c0b03ccd111b179a5a_JaffaCakes118
-
Size
380KB
-
Sample
241023-vjdpaashkr
-
MD5
6ff3bdae7667c0c0b03ccd111b179a5a
-
SHA1
e2a7deaaf893dff1c43ed3c47a46d9736d3c882e
-
SHA256
b97e3b5e91f3b74869b50e582c3c602eb1257edc34b0988325e37c9ce2bfb352
-
SHA512
38b008cb5c6c8568d4399d51a9b5839399db024523999903de3d733660a407e1c582267ee1cb26fdca15636d6b199765207268d2ad2c0148f5ef2edc2e1156ff
-
SSDEEP
6144:hCDzLSGZ3weiQtv8qiv8TFWRaxfjcJB5BPsZpblyBXarYKHy/IPP+Y:hCDz+G6eiQt0bmcccSwBXQlP2Y
Static task
static1
Behavioral task
behavioral1
Sample
6ff3bdae7667c0c0b03ccd111b179a5a_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
6ff3bdae7667c0c0b03ccd111b179a5a_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
6ff3bdae7667c0c0b03ccd111b179a5a_JaffaCakes118.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
6ff3bdae7667c0c0b03ccd111b179a5a_JaffaCakes118
-
Size
380KB
-
MD5
6ff3bdae7667c0c0b03ccd111b179a5a
-
SHA1
e2a7deaaf893dff1c43ed3c47a46d9736d3c882e
-
SHA256
b97e3b5e91f3b74869b50e582c3c602eb1257edc34b0988325e37c9ce2bfb352
-
SHA512
38b008cb5c6c8568d4399d51a9b5839399db024523999903de3d733660a407e1c582267ee1cb26fdca15636d6b199765207268d2ad2c0148f5ef2edc2e1156ff
-
SSDEEP
6144:hCDzLSGZ3weiQtv8qiv8TFWRaxfjcJB5BPsZpblyBXarYKHy/IPP+Y:hCDz+G6eiQt0bmcccSwBXQlP2Y
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1Suppress Application Icon
1Virtualization/Sandbox Evasion
2System Checks
2