General
-
Target
7078042eab3a6342a934245e49a9d99b_JaffaCakes118
-
Size
908KB
-
Sample
241023-x7hz1sybpq
-
MD5
7078042eab3a6342a934245e49a9d99b
-
SHA1
bd5c302f35ee63694d28a28cc609a54cb406561b
-
SHA256
0383375cbfa4767223b130c214d8c3ae10d0918fba8a3771ca43c1f69ee0c053
-
SHA512
8dd820d81a9aba5eb20200a9ee4368350c3fa8fb578112a25b7c70a12502f87ab3eff8f6ed0836a9a402d461b98ca9154a4a1df2dc62b33ca6316acc929e1230
-
SSDEEP
12288:6ALHbRk7h7jBC2kuGy9sNeVUyLVigOu113jnW32VtStEqX75OYsbs8S0hS6nxQOT:6ALKNjBDENcUrY3jW3L5OYduS62Ops8
Static task
static1
Behavioral task
behavioral1
Sample
7078042eab3a6342a934245e49a9d99b_JaffaCakes118.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
7078042eab3a6342a934245e49a9d99b_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
7078042eab3a6342a934245e49a9d99b_JaffaCakes118.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
7078042eab3a6342a934245e49a9d99b_JaffaCakes118
-
Size
908KB
-
MD5
7078042eab3a6342a934245e49a9d99b
-
SHA1
bd5c302f35ee63694d28a28cc609a54cb406561b
-
SHA256
0383375cbfa4767223b130c214d8c3ae10d0918fba8a3771ca43c1f69ee0c053
-
SHA512
8dd820d81a9aba5eb20200a9ee4368350c3fa8fb578112a25b7c70a12502f87ab3eff8f6ed0836a9a402d461b98ca9154a4a1df2dc62b33ca6316acc929e1230
-
SSDEEP
12288:6ALHbRk7h7jBC2kuGy9sNeVUyLVigOu113jnW32VtStEqX75OYsbs8S0hS6nxQOT:6ALKNjBDENcUrY3jW3L5OYduS62Ops8
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-