General
-
Target
6c657c4ce9b1f1bf0b0aa50f341760b7_JaffaCakes118
-
Size
6.9MB
-
Sample
240523-1w7e1sad86
-
MD5
6c657c4ce9b1f1bf0b0aa50f341760b7
-
SHA1
53c9e67422c0c45eafb3006d05b214fcfa40bc04
-
SHA256
6bedfcb53484a3f6213b3fd8d197803f00cd3f8ec86a5c26725d53cdb4d66442
-
SHA512
b9d5cfc4d7b9fc1783c5146b54f4e49b27ccaec7d070310073783c10f1abf65fe5df939fae15c793b6ec25c5f91377625fa3d51ffabb56e03b3cea64b5b0585e
-
SSDEEP
98304:+Lhhw245drCFhNrI7/5oOnS0JJCQGwRzhfHQ6yP3lNNJnlgGEG53SgjtwV38:+t2dINrI7RoOvbZf36VNNJlf3zaM
Static task
static1
Behavioral task
behavioral1
Sample
6c657c4ce9b1f1bf0b0aa50f341760b7_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6c657c4ce9b1f1bf0b0aa50f341760b7_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
6c657c4ce9b1f1bf0b0aa50f341760b7_JaffaCakes118
-
Size
6.9MB
-
MD5
6c657c4ce9b1f1bf0b0aa50f341760b7
-
SHA1
53c9e67422c0c45eafb3006d05b214fcfa40bc04
-
SHA256
6bedfcb53484a3f6213b3fd8d197803f00cd3f8ec86a5c26725d53cdb4d66442
-
SHA512
b9d5cfc4d7b9fc1783c5146b54f4e49b27ccaec7d070310073783c10f1abf65fe5df939fae15c793b6ec25c5f91377625fa3d51ffabb56e03b3cea64b5b0585e
-
SSDEEP
98304:+Lhhw245drCFhNrI7/5oOnS0JJCQGwRzhfHQ6yP3lNNJnlgGEG53SgjtwV38:+t2dINrI7RoOvbZf36VNNJlf3zaM
Score8/10-
Checks if the Android device is rooted.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries the unique device ID (IMEI, MEID, IMSI)
-