General
-
Target
24d060032ddc3551b7de773166b6634c_JaffaCakes118
-
Size
2.1MB
-
Sample
240704-gb6hfaxbjn
-
MD5
24d060032ddc3551b7de773166b6634c
-
SHA1
7f626e88dae186e415945859953bbd8730ed2a72
-
SHA256
3e22a8145ea4b66cf17378176990f1eabe01f3bc6656974093e4fd8f8b7c34c9
-
SHA512
3256319d092d6ddb5e0912a2ac4a0eb60089e77e64725410801df17c8ac45fa742b5e64942d43fa75945edf483cc5312b820d1e02e913fee16242170f81a6124
-
SSDEEP
49152:W/YItbdFWtMs3cbzu3yG4u7mRwEKqoryzv5aCf808xKFHwRpH/r:UFW2sMbzuiG4u7menyjECiHH/r
Static task
static1
Behavioral task
behavioral1
Sample
24d060032ddc3551b7de773166b6634c_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
24d060032ddc3551b7de773166b6634c_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
24d060032ddc3551b7de773166b6634c_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
24d060032ddc3551b7de773166b6634c_JaffaCakes118
-
Size
2.1MB
-
MD5
24d060032ddc3551b7de773166b6634c
-
SHA1
7f626e88dae186e415945859953bbd8730ed2a72
-
SHA256
3e22a8145ea4b66cf17378176990f1eabe01f3bc6656974093e4fd8f8b7c34c9
-
SHA512
3256319d092d6ddb5e0912a2ac4a0eb60089e77e64725410801df17c8ac45fa742b5e64942d43fa75945edf483cc5312b820d1e02e913fee16242170f81a6124
-
SSDEEP
49152:W/YItbdFWtMs3cbzu3yG4u7mRwEKqoryzv5aCf808xKFHwRpH/r:UFW2sMbzuiG4u7menyjECiHH/r
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-