General
-
Target
8e5ede909a9e74c936e68819ce9afe84_JaffaCakes118
-
Size
31.0MB
-
Sample
240602-rpkg8sfd28
-
MD5
8e5ede909a9e74c936e68819ce9afe84
-
SHA1
905065d6b7ac46f45806a8794ff3b56cb7eafdbd
-
SHA256
4b56ac24ecf6c7700daf021ba818496feec061d3def85ee5ada2f79f5bc0761c
-
SHA512
c1223e1e906bd78d766e4c3b73dff6e60f3956ac0267e4859958ce9ab6a92043fb6323ae51ede2514cb6dcaa851d85b29767e8471f0eb5e2dfe7bb1593dd3d0f
-
SSDEEP
786432:aEro8eM4hQx99GK5J28CkZT7CkC5li+2NYzvien876uC3JsSMGAw6:s8eM4uMK5TJZvJC5li+VKen0xC3MGI
Static task
static1
Behavioral task
behavioral1
Sample
8e5ede909a9e74c936e68819ce9afe84_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
8e5ede909a9e74c936e68819ce9afe84_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
gdtad.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral4
Sample
gdtad.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral5
Sample
gdtad.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
8e5ede909a9e74c936e68819ce9afe84_JaffaCakes118
-
Size
31.0MB
-
MD5
8e5ede909a9e74c936e68819ce9afe84
-
SHA1
905065d6b7ac46f45806a8794ff3b56cb7eafdbd
-
SHA256
4b56ac24ecf6c7700daf021ba818496feec061d3def85ee5ada2f79f5bc0761c
-
SHA512
c1223e1e906bd78d766e4c3b73dff6e60f3956ac0267e4859958ce9ab6a92043fb6323ae51ede2514cb6dcaa851d85b29767e8471f0eb5e2dfe7bb1593dd3d0f
-
SSDEEP
786432:aEro8eM4hQx99GK5J28CkZT7CkC5li+2NYzvien876uC3JsSMGAw6:s8eM4uMK5TJZvJC5li+VKen0xC3MGI
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
-
-
Target
gdtad.jar
-
Size
75KB
-
MD5
7068fc92af9e6dc686de8924e174180b
-
SHA1
e8c47cb6f40b058b96bc5ab1bbff6a0a1a2adf2b
-
SHA256
8b759e7358f706522f51d8774d38f264e13bd62dd49b1825b0ca7dfcc0c9e299
-
SHA512
05ab5cfb9df4cca02c43bbc81a8e8b10469dd27604d487591fe15d3620d8623bb19d30af9607430e0a73fd04df02ffbf551f5c1e58af24293f681c928395aaa0
-
SSDEEP
1536:P3AK+z0NSabIMKCxTEGDpCrLHgOnAOxyZV9r4L8fHROwbY3zZJYgwxx+p9/3:P3AKZNSafTrNkLxn36VVfYwbY3zZJY9W
Score1/10 -