General
-
Target
6d17678dfdcd26d953803e77fba1de39_JaffaCakes118
-
Size
20.4MB
-
Sample
240524-c8yrmsad8z
-
MD5
6d17678dfdcd26d953803e77fba1de39
-
SHA1
aed010612f9e55846c6d6b849a71d0e2451d6426
-
SHA256
2b82dbe495a006849a3daa4c75c1a69f5fb1c0e7311afc63b5c554d419c572df
-
SHA512
dfdf7906c76df07c37a94b32210c69e68d0f33b4f7a40d2cbc393cd52d5430efecda71d3ff627892824b4276c73acf721bd82919a8e29ec73f32ba93dd795bce
-
SSDEEP
393216:or31Ite6zgFXfS9Ra3NZTZN7tN38HW+ftQZ5+a8ujMTzTuXy2:Kmte6zgFXqza3nZNJd8HW+1fuwTXQN
Static task
static1
Behavioral task
behavioral1
Sample
6d17678dfdcd26d953803e77fba1de39_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6d17678dfdcd26d953803e77fba1de39_JaffaCakes118
-
Size
20.4MB
-
MD5
6d17678dfdcd26d953803e77fba1de39
-
SHA1
aed010612f9e55846c6d6b849a71d0e2451d6426
-
SHA256
2b82dbe495a006849a3daa4c75c1a69f5fb1c0e7311afc63b5c554d419c572df
-
SHA512
dfdf7906c76df07c37a94b32210c69e68d0f33b4f7a40d2cbc393cd52d5430efecda71d3ff627892824b4276c73acf721bd82919a8e29ec73f32ba93dd795bce
-
SSDEEP
393216:or31Ite6zgFXfS9Ra3NZTZN7tN38HW+ftQZ5+a8ujMTzTuXy2:Kmte6zgFXqza3nZNJd8HW+1fuwTXQN
Score8/10-
Checks Android system properties for emulator presence.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
3System Checks
3