General
-
Target
72c97d9a34bb1088759ed49067ec62bf_JaffaCakes118
-
Size
1.3MB
-
Sample
240525-wjg75sda78
-
MD5
72c97d9a34bb1088759ed49067ec62bf
-
SHA1
55acc083624c90f25c90e875b89a04e134b80fe9
-
SHA256
99fd4397853f9858fa1cac86414ff2d671cbc4ca75bb95b2633db5bbb5f9abee
-
SHA512
0bfab357bda569fb730c4161a3e15efd4e1a064a8cec57571e26e5eddc7eba2d07441c444310c32395d8bbf0581ca36cda2a9c8146766809758cc8d1129e470a
-
SSDEEP
24576:JoL0otaYtXMjG6dJZXs+bS8oaPnDAUCxFMMjfo+B4jVAnq/13tdHbZKm51Ob83J1:CQ7YtSdJZJboaPDAUcFzjjyjVAnq/1Xj
Static task
static1
Behavioral task
behavioral1
Sample
72c97d9a34bb1088759ed49067ec62bf_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
72c97d9a34bb1088759ed49067ec62bf_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
72c97d9a34bb1088759ed49067ec62bf_JaffaCakes118
-
Size
1.3MB
-
MD5
72c97d9a34bb1088759ed49067ec62bf
-
SHA1
55acc083624c90f25c90e875b89a04e134b80fe9
-
SHA256
99fd4397853f9858fa1cac86414ff2d671cbc4ca75bb95b2633db5bbb5f9abee
-
SHA512
0bfab357bda569fb730c4161a3e15efd4e1a064a8cec57571e26e5eddc7eba2d07441c444310c32395d8bbf0581ca36cda2a9c8146766809758cc8d1129e470a
-
SSDEEP
24576:JoL0otaYtXMjG6dJZXs+bS8oaPnDAUCxFMMjfo+B4jVAnq/13tdHbZKm51Ob83J1:CQ7YtSdJZJboaPDAUcFzjjyjVAnq/1Xj
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1Suppress Application Icon
1Virtualization/Sandbox Evasion
1System Checks
1