General
-
Target
6d12495dea7d0ccbe7aa1901b0864fee_JaffaCakes118
-
Size
20.4MB
-
Sample
240524-c2qsfsab7v
-
MD5
6d12495dea7d0ccbe7aa1901b0864fee
-
SHA1
a159438561d6ef79bb0fe70160cc7fe648dae1cc
-
SHA256
15e02a0cf72ac63db4a691dde82cf27e9884e0c8ebd06dd6d950bcce76fdfb3e
-
SHA512
2a529c54fea0804946ca47f25613a85191918465e2935eeb10aac45ff506b990536bd9b4077ba6bd20881fec85d372c68a80ebb83ac31e05aa8437757cf3c51f
-
SSDEEP
393216:RrKcriYHaL9/6JvcxN9yrMPU0u8dTON8EaDOiuUs9UX1dRnJ9zP1BK/Sya:FKcriYHaRyRcf9Rvu8dyN8hDluRqF7PR
Static task
static1
Behavioral task
behavioral1
Sample
6d12495dea7d0ccbe7aa1901b0864fee_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6d12495dea7d0ccbe7aa1901b0864fee_JaffaCakes118
-
Size
20.4MB
-
MD5
6d12495dea7d0ccbe7aa1901b0864fee
-
SHA1
a159438561d6ef79bb0fe70160cc7fe648dae1cc
-
SHA256
15e02a0cf72ac63db4a691dde82cf27e9884e0c8ebd06dd6d950bcce76fdfb3e
-
SHA512
2a529c54fea0804946ca47f25613a85191918465e2935eeb10aac45ff506b990536bd9b4077ba6bd20881fec85d372c68a80ebb83ac31e05aa8437757cf3c51f
-
SSDEEP
393216:RrKcriYHaL9/6JvcxN9yrMPU0u8dTON8EaDOiuUs9UX1dRnJ9zP1BK/Sya:FKcriYHaRyRcf9Rvu8dyN8hDluRqF7PR
Score8/10-
Checks Android system properties for emulator presence.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
3System Checks
3