General
-
Target
996a6253442f8fb3db2abcb7cf567c73_JaffaCakes118
-
Size
31.2MB
-
Sample
240605-2gcsjaah3z
-
MD5
996a6253442f8fb3db2abcb7cf567c73
-
SHA1
134f0b3f08ee0935587457bad6e812670c2792ee
-
SHA256
6354fc91a202d813556857e8b301c8a72b586be86b11f20f3960c0bdb273abbe
-
SHA512
a154bc312c045eb93c87d0b6f473b115a8e7b335eea8f34e7a7dc7ff009caf2fb1878f61173a136088e10997fed51195721b1172bf46cb39609cb1b39c804191
-
SSDEEP
786432:OvX/V4NjOnhlFra+T9HjysUqvPGAY36xQTBMg51p3g:Ovd4NjOh2UH+sUrA8OgHpQ
Static task
static1
Behavioral task
behavioral1
Sample
996a6253442f8fb3db2abcb7cf567c73_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Malware Config
Targets
-
-
Target
996a6253442f8fb3db2abcb7cf567c73_JaffaCakes118
-
Size
31.2MB
-
MD5
996a6253442f8fb3db2abcb7cf567c73
-
SHA1
134f0b3f08ee0935587457bad6e812670c2792ee
-
SHA256
6354fc91a202d813556857e8b301c8a72b586be86b11f20f3960c0bdb273abbe
-
SHA512
a154bc312c045eb93c87d0b6f473b115a8e7b335eea8f34e7a7dc7ff009caf2fb1878f61173a136088e10997fed51195721b1172bf46cb39609cb1b39c804191
-
SSDEEP
786432:OvX/V4NjOnhlFra+T9HjysUqvPGAY36xQTBMg51p3g:Ovd4NjOh2UH+sUrA8OgHpQ
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-