General
-
Target
8c51d32b6086d67545adb3c54af57ef4_JaffaCakes118
-
Size
4.9MB
-
Sample
241103-tka44syerj
-
MD5
8c51d32b6086d67545adb3c54af57ef4
-
SHA1
bd462c7f17968e09d8cf8ac0094b3be7c6e54c9e
-
SHA256
8593f63053d12d6ab7028f277f32874fba3bcbdbba38dda44d5b7f94dbf49aa0
-
SHA512
320b63c109fe6ce01d476a6580a5cdbeb28727bb6e8cdaa9498c4b06a6c191eab9f6262f9a6d229b92a617e3724a54ce1b158ef11a8d7447202e63978dd70974
-
SSDEEP
98304:yJtAQEY6PHv5lvnGsJbOkNZNkt2TLhENUOHudezPbXafuN2ro:28DuwhfNktuLhENtOomWck
Static task
static1
Behavioral task
behavioral1
Sample
8c51d32b6086d67545adb3c54af57ef4_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
8c51d32b6086d67545adb3c54af57ef4_JaffaCakes118.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
8c51d32b6086d67545adb3c54af57ef4_JaffaCakes118
-
Size
4.9MB
-
MD5
8c51d32b6086d67545adb3c54af57ef4
-
SHA1
bd462c7f17968e09d8cf8ac0094b3be7c6e54c9e
-
SHA256
8593f63053d12d6ab7028f277f32874fba3bcbdbba38dda44d5b7f94dbf49aa0
-
SHA512
320b63c109fe6ce01d476a6580a5cdbeb28727bb6e8cdaa9498c4b06a6c191eab9f6262f9a6d229b92a617e3724a54ce1b158ef11a8d7447202e63978dd70974
-
SSDEEP
98304:yJtAQEY6PHv5lvnGsJbOkNZNkt2TLhENUOHudezPbXafuN2ro:28DuwhfNktuLhENtOomWck
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-