General
-
Target
8996847fd34ddcc606997227a50a7c22_JaffaCakes118
-
Size
17.7MB
-
Sample
240601-g2ykhsdb82
-
MD5
8996847fd34ddcc606997227a50a7c22
-
SHA1
627c4ec24073ff3571b8553b3613c7bedcfb4f4a
-
SHA256
0875a12d853f9b328aef44ca2d2e2ccfe01a3aaef34f1d0fa0e7327add28a3cd
-
SHA512
ef4ea79cebeea6cba36d354b96e195a59e87fc707a6de748dfa4ecefd3feb72a3c3c30b390811f95e99f270aa72335a1a0963617d6e72a70a08deb963952c08f
-
SSDEEP
393216:JKFXA4EGOmSCMK6r0w0Gz4hIteUIfzRjdhOQM6go:SQ4/pHvGzoIebjdh09o
Static task
static1
Behavioral task
behavioral1
Sample
8996847fd34ddcc606997227a50a7c22_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
8996847fd34ddcc606997227a50a7c22_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
8996847fd34ddcc606997227a50a7c22_JaffaCakes118
-
Size
17.7MB
-
MD5
8996847fd34ddcc606997227a50a7c22
-
SHA1
627c4ec24073ff3571b8553b3613c7bedcfb4f4a
-
SHA256
0875a12d853f9b328aef44ca2d2e2ccfe01a3aaef34f1d0fa0e7327add28a3cd
-
SHA512
ef4ea79cebeea6cba36d354b96e195a59e87fc707a6de748dfa4ecefd3feb72a3c3c30b390811f95e99f270aa72335a1a0963617d6e72a70a08deb963952c08f
-
SSDEEP
393216:JKFXA4EGOmSCMK6r0w0Gz4hIteUIfzRjdhOQM6go:SQ4/pHvGzoIebjdh09o
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries the unique device ID (IMEI, MEID, IMSI)
-