General
-
Target
8cb36d8fe5e25ce4ae24c91108a9dc44_JaffaCakes118
-
Size
921KB
-
Sample
241103-v8j8cszdld
-
MD5
8cb36d8fe5e25ce4ae24c91108a9dc44
-
SHA1
020869b4650ef869b49bd106db0f532cde84d8c1
-
SHA256
ba580e0fdce015b6c15a3c0b5d89fd330a3d8e75d6ef4b9243cd5b6a9e51d5b8
-
SHA512
50a807f5d98395c856ed0f708cb81d102072f628ce5ac19005eb3603668fa75ddb949b0968dbe79172cbbd978d915a605e6b82a79d9b587d5736bceb659fc39b
-
SSDEEP
24576:vbqXj5Xh52IDv+hPEQLbIINN7umGLrCXB3TYdCMZ:vb8daI7+hPEobIIrCmGLGdTYMMZ
Static task
static1
Behavioral task
behavioral1
Sample
8cb36d8fe5e25ce4ae24c91108a9dc44_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
8cb36d8fe5e25ce4ae24c91108a9dc44_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
8cb36d8fe5e25ce4ae24c91108a9dc44_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
8cb36d8fe5e25ce4ae24c91108a9dc44_JaffaCakes118
-
Size
921KB
-
MD5
8cb36d8fe5e25ce4ae24c91108a9dc44
-
SHA1
020869b4650ef869b49bd106db0f532cde84d8c1
-
SHA256
ba580e0fdce015b6c15a3c0b5d89fd330a3d8e75d6ef4b9243cd5b6a9e51d5b8
-
SHA512
50a807f5d98395c856ed0f708cb81d102072f628ce5ac19005eb3603668fa75ddb949b0968dbe79172cbbd978d915a605e6b82a79d9b587d5736bceb659fc39b
-
SSDEEP
24576:vbqXj5Xh52IDv+hPEQLbIINN7umGLrCXB3TYdCMZ:vb8daI7+hPEobIIrCmGLGdTYMMZ
-
Checks Android system properties for emulator presence.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1Suppress Application Icon
1Virtualization/Sandbox Evasion
2System Checks
2