General
-
Target
72cc3f4cbcb638d388bddcde5f534f58_JaffaCakes118
-
Size
4.4MB
-
Sample
240525-wlzj7scf8v
-
MD5
72cc3f4cbcb638d388bddcde5f534f58
-
SHA1
6e2267ec91992ecd2bd8e905800d83445af5c106
-
SHA256
b0635efa29083e1376cd5278ab616ff8925cff3b9b2aa4193c72799c55efd06c
-
SHA512
afadf58c7b1c45140fad28de67a7da8c4a2d1456288fe247fbf8e42bddaaadcf898ee0a56974435972bb9c8953579c1605a1dc698c9cf20b2e073f10e603faac
-
SSDEEP
98304:nbeouyxTeYj0TbNwJwRM3/Rui4OGnsxFSNLTXQwbF7E5uBLTN03buT8O58Y:nVeYjGSPRui47sxFSVgwbtOWPN0LuwOp
Static task
static1
Behavioral task
behavioral1
Sample
72cc3f4cbcb638d388bddcde5f534f58_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
72cc3f4cbcb638d388bddcde5f534f58_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
72cc3f4cbcb638d388bddcde5f534f58_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral4
Sample
gdtad.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral5
Sample
gdtad.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral6
Sample
gdtad.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
72cc3f4cbcb638d388bddcde5f534f58_JaffaCakes118
-
Size
4.4MB
-
MD5
72cc3f4cbcb638d388bddcde5f534f58
-
SHA1
6e2267ec91992ecd2bd8e905800d83445af5c106
-
SHA256
b0635efa29083e1376cd5278ab616ff8925cff3b9b2aa4193c72799c55efd06c
-
SHA512
afadf58c7b1c45140fad28de67a7da8c4a2d1456288fe247fbf8e42bddaaadcf898ee0a56974435972bb9c8953579c1605a1dc698c9cf20b2e073f10e603faac
-
SSDEEP
98304:nbeouyxTeYj0TbNwJwRM3/Rui4OGnsxFSNLTXQwbF7E5uBLTN03buT8O58Y:nVeYjGSPRui47sxFSVgwbtOWPN0LuwOp
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
-
-
Target
gdtad.jar
-
Size
69KB
-
MD5
595b2a62c7377a811a24307102751b11
-
SHA1
55814431108f7f847ea252bc4b21cf70a37280b6
-
SHA256
e53cba6378e274af8716011e0ec56a2c1209c3aecd6f2aa2384f0034348ae4a7
-
SHA512
31d168d07dc5b9da8a57db387e9a4a5b6bee6f26218cd80f078b8fde4cac947a7b122e78a1c43165b10afe8a0583abfc102f001bba6168691e4f7049f699eb2f
-
SSDEEP
1536:lsxryGVNeJOwxZhAt0fBovXjEl0hISz2qr+0L/R+GGgrHTPZIRJ:pGLeJfxZhAt0q7ECF2yrzQ
Score1/10 -
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
2System Checks
2