General
-
Target
6e63eee5ea40b49a8585f5857d023e43_JaffaCakes118
-
Size
4.6MB
-
Sample
240524-nv6qwafg4y
-
MD5
6e63eee5ea40b49a8585f5857d023e43
-
SHA1
24327ac5cc4e92da8030fe6b4bdd3a687154e178
-
SHA256
78d83ba2ceb7e074d12c5540505d85306ab0dc8655709a812af1ce90ecc1baec
-
SHA512
7c41f9b8f31bd846bb27ca237fd9aeb1d8e17e791a2149173efeccabfbc5fe4d4584950ba0c6344e7f1a84465548efbc8accb929bfc33852ba5d2dc972b06043
-
SSDEEP
98304:h7RUiof/zkcsolU4g6C85ixZrgrhJ24eejVE9cP0R1Li5TlYnXYK:XpubRlUF4eW5P0RE5Ti
Static task
static1
Behavioral task
behavioral1
Sample
6e63eee5ea40b49a8585f5857d023e43_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
6e63eee5ea40b49a8585f5857d023e43_JaffaCakes118
-
Size
4.6MB
-
MD5
6e63eee5ea40b49a8585f5857d023e43
-
SHA1
24327ac5cc4e92da8030fe6b4bdd3a687154e178
-
SHA256
78d83ba2ceb7e074d12c5540505d85306ab0dc8655709a812af1ce90ecc1baec
-
SHA512
7c41f9b8f31bd846bb27ca237fd9aeb1d8e17e791a2149173efeccabfbc5fe4d4584950ba0c6344e7f1a84465548efbc8accb929bfc33852ba5d2dc972b06043
-
SSDEEP
98304:h7RUiof/zkcsolU4g6C85ixZrgrhJ24eejVE9cP0R1Li5TlYnXYK:XpubRlUF4eW5P0RE5Ti
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the phone number (MSISDN for GSM devices)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-