General
-
Target
b15fb7b56ac9ba41cba47d842870d97c_JaffaCakes118
-
Size
1.6MB
-
Sample
241129-p6ay1s1mbm
-
MD5
b15fb7b56ac9ba41cba47d842870d97c
-
SHA1
6ad7559e97813216411e88fde128ad74676a8f1d
-
SHA256
aa4d4f27aded0cebee2adb20bb633c9e091012132918a95a2d1c0a2e6e420a46
-
SHA512
15dd158df0db06c1abf6bdfa02d9efa33212dda3bac034e2eb784423622070fcae0366ad5da212e0055a8885b50372d67e510b93bd2390ef514023547fd1b768
-
SSDEEP
49152:FBS0EWQreRSdygFWMbRURXfn6YdxNrhA08UAL:zS+RSLFWMEXf6eNrhAnUO
Static task
static1
Behavioral task
behavioral1
Sample
b15fb7b56ac9ba41cba47d842870d97c_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
b15fb7b56ac9ba41cba47d842870d97c_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
b15fb7b56ac9ba41cba47d842870d97c_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
b15fb7b56ac9ba41cba47d842870d97c_JaffaCakes118
-
Size
1.6MB
-
MD5
b15fb7b56ac9ba41cba47d842870d97c
-
SHA1
6ad7559e97813216411e88fde128ad74676a8f1d
-
SHA256
aa4d4f27aded0cebee2adb20bb633c9e091012132918a95a2d1c0a2e6e420a46
-
SHA512
15dd158df0db06c1abf6bdfa02d9efa33212dda3bac034e2eb784423622070fcae0366ad5da212e0055a8885b50372d67e510b93bd2390ef514023547fd1b768
-
SSDEEP
49152:FBS0EWQreRSdygFWMbRURXfn6YdxNrhA08UAL:zS+RSLFWMEXf6eNrhAnUO
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-