Analysis
-
max time kernel
35s -
max time network
128s -
platform
android_x64 -
resource
android-x64-20240514-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240514-enlocale:en-usos:android-10-x64system -
submitted
30/05/2024, 13:30
Behavioral task
behavioral1
Sample
84524e61dcc6f6a7cbb094feead6f684_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
General
-
Target
84524e61dcc6f6a7cbb094feead6f684_JaffaCakes118.apk
-
Size
28.8MB
-
MD5
84524e61dcc6f6a7cbb094feead6f684
-
SHA1
b4b7929f508760e7ec1e7908213e03658bf8ef9b
-
SHA256
73ce90aba4131d00cf775924f813b008cb82ddbe65f5af6d1f95d470b7e11631
-
SHA512
dca435fea1ae1dd59c6339f28aa03e21b8dbc61d540b325ee8cf6112a0324bb3c4419c59ae13930106392f86cda2ff7cc2a613600573022054c77e4fb1954a8b
-
SSDEEP
786432:Z+D9vZ+oT0yGW81hsho5yrzn55+bUPM75XkQK1vZZZx:Z+hvZRY73A55+bUUV0Q8
Malware Config
Signatures
-
Checks if the internet connection is available 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.gaishiqunying -
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org 1 IoCs
flow ioc 7 f.appjiagu.com -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.gaishiqunying
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.8MB
MD58eed5cb48a5e3c0a42e53fbbb1a9cb30
SHA1177439230133f5f608419c07436ebce08ca63451
SHA2568b4127ff010e2c44e46d804511737f541f160303c54cc1ad07899b7be83b0d12
SHA512e3106a69b86c40166254ebe5a94bb5f9f46e1876bbbb7d340c98f70a041a7c6593cccc2644d7d3eb7584990a38aec71a8b9de3e938eca92231b22381384b7789
-
Filesize
363KB
MD51383b616dee6678b3591e577ace67225
SHA1f2b0f5968b52f9c3ed022f3b3ba67e6142df89ba
SHA256945e12ea3019404a01754579a234b21ff3c7c17c175750e514c0d404e9f30554
SHA51272dda5b9833701c52e44260d979f6b91dface07899aa20ea686ef3d09f3225826140b7e8c336072aca21d51e88151a3fdb6952fc53b9749051f16197e8086b60