General
-
Target
71de92616ddc25b0ebc6fe6014772f00_JaffaCakes118
-
Size
13.3MB
-
Sample
240525-n4lr3agd8x
-
MD5
71de92616ddc25b0ebc6fe6014772f00
-
SHA1
8c214b25926ef75eee27dc56de6f7db71f67e683
-
SHA256
a49d230f33ea40dc7a2525b8bf6b59185e7062a5a014d23b1ee08286f1221c63
-
SHA512
a226e7c7974b56a8c61a17f935fb84a856c86ee40f06c439666d6125f661877004a3bd01de33ab5c8f3a85d505ffc878a53e2b2d2aa55a0bf87fba0ae060a2d4
-
SSDEEP
393216:meRXi1y7zrU4IOrHYNrkxmW8okJtG/vMx:mp1WzrUJOxMTIvg
Static task
static1
Behavioral task
behavioral1
Sample
71de92616ddc25b0ebc6fe6014772f00_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
71de92616ddc25b0ebc6fe6014772f00_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240514-en
Behavioral task
behavioral3
Sample
gdtadv2.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral4
Sample
gdtadv2.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral5
Sample
gdtadv2.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
71de92616ddc25b0ebc6fe6014772f00_JaffaCakes118
-
Size
13.3MB
-
MD5
71de92616ddc25b0ebc6fe6014772f00
-
SHA1
8c214b25926ef75eee27dc56de6f7db71f67e683
-
SHA256
a49d230f33ea40dc7a2525b8bf6b59185e7062a5a014d23b1ee08286f1221c63
-
SHA512
a226e7c7974b56a8c61a17f935fb84a856c86ee40f06c439666d6125f661877004a3bd01de33ab5c8f3a85d505ffc878a53e2b2d2aa55a0bf87fba0ae060a2d4
-
SSDEEP
393216:meRXi1y7zrU4IOrHYNrkxmW8okJtG/vMx:mp1WzrUJOxMTIvg
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
-
-
Target
gdtadv2.jar
-
Size
184KB
-
MD5
027ece4a90aac4d84812efa9b20b2af7
-
SHA1
564ec02d38ad8419fb3a96bed470c7a2632d3c35
-
SHA256
ce6f738fc3df590a63cf02cae624cae1384a3198b24b9e11d26d1818c45ab98d
-
SHA512
fbbdec0c28dc0c32d398f1e28cbf5a76a496bf8f6613a90aeda99ef62ff042eb58cd7cf747b1b03ce6cba00caecf1f20a0251d7b3fb999ddecdd3b01ade209e0
-
SSDEEP
3072:npJhJKLgGoJc+oJIvPy2/wD0WZRv18NIkTbIgdSqwsKj7OnY2KFSt9LGKLRM:npJhJxr/HyB0oNmHIgd2pj7cYe3LRM
Score1/10 -
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
2System Checks
2