General
-
Target
6f3e20b3fd75c752c9a872481203bf4a_JaffaCakes118
-
Size
23.0MB
-
Sample
240524-vryz7ada5y
-
MD5
6f3e20b3fd75c752c9a872481203bf4a
-
SHA1
427820d1e3af3bbfe00e538eadfb17aa9adc2c8a
-
SHA256
517f40c8b272a3f90a6a692dd35d8d541492579d5a3bf0300e0d73b12b3100f9
-
SHA512
ae04896711a5ce56c1717152e27e21fdb3c1c9cb2e8d04e39e1f0035227e016c6ccd41bdc8679384b5e2a0c8c3a2ffdc32acfceec8b47cc30bdcbec6cbffd19c
-
SSDEEP
393216:z4W34qmm67G8/ui88dUqytF+Ffh4H+8RXX3W8w9w9Peh+K3W8w9w9PDLoYRsezWS:N/m/7GSdUxtF+FfK19XGxw9mh+KGxw9b
Static task
static1
Behavioral task
behavioral1
Sample
6f3e20b3fd75c752c9a872481203bf4a_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
app-debug.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral3
Sample
app-debug.apk
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral4
Sample
gdtadv2.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral5
Sample
gdtadv2.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral6
Sample
gdtadv2.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
6f3e20b3fd75c752c9a872481203bf4a_JaffaCakes118
-
Size
23.0MB
-
MD5
6f3e20b3fd75c752c9a872481203bf4a
-
SHA1
427820d1e3af3bbfe00e538eadfb17aa9adc2c8a
-
SHA256
517f40c8b272a3f90a6a692dd35d8d541492579d5a3bf0300e0d73b12b3100f9
-
SHA512
ae04896711a5ce56c1717152e27e21fdb3c1c9cb2e8d04e39e1f0035227e016c6ccd41bdc8679384b5e2a0c8c3a2ffdc32acfceec8b47cc30bdcbec6cbffd19c
-
SSDEEP
393216:z4W34qmm67G8/ui88dUqytF+Ffh4H+8RXX3W8w9w9Peh+K3W8w9w9PDLoYRsezWS:N/m/7GSdUxtF+FfK19XGxw9mh+KGxw9b
Score8/10-
Checks if the Android device is rooted.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
-
-
Target
app-debug.apk
-
Size
1.1MB
-
MD5
5b7faf6a8748eed5323c979ebead1021
-
SHA1
584727ffce6cbf8c09fdbf51cc150bdd74809c0b
-
SHA256
0a78d86cd88361b666c49f00f67d3e60fde03dae7c239b153f7cb500818b956f
-
SHA512
05ad368807b8a12a64765e4d696e16e6cbad63eef03a08e98a45af986d023c4d9e818060103cc0194a8c73dc17058e647fc58422d7f4d7110c549699395b09b4
-
SSDEEP
24576:boV2AxoTMEQYb16BkM24L+2AG5E8JZIHQanKU7gice7J:boV2gqMEQE6BkM24S2j5E8AHLgicm
Score7/10-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
-
-
Target
gdtadv2.jar
-
Size
246KB
-
MD5
ef88132318d986627c2dd75e366149aa
-
SHA1
f9e5886571c1f7d2c70d11bf98a172b08576892b
-
SHA256
00e3b2f68c0e0928ebad2654bf68d594bb013a386336af5dcc52618d6f23c34a
-
SHA512
b7951258ce49ef7800621a8e3fe8e377c85e1f3c69b4de38ad297945e4da150074325e9e0d3988841afa12831bc5856612e42de24e77df5145cb4e75996d3d98
-
SSDEEP
3072:RcAgpT2vQCCJ7AS/ZSEPclIxwAGTIspsWVvXSEFxtAk3x1KNDQOBz9uCgp2PNp+N:RUCcJBhSEPcawG0JXHxtd1KduCjP6FH
Score1/10 -
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
4System Checks
4