General
-
Target
97e3afd871e22aa25530d6f57ba8a31f_JaffaCakes118
-
Size
20.8MB
-
Sample
240605-mnmtraea64
-
MD5
97e3afd871e22aa25530d6f57ba8a31f
-
SHA1
f9ad4eb601f04da462d20f3671901778e8e9bde1
-
SHA256
d8e3522c497722efe67add2b33b1a7686e00d976bb3749ff64e3f3a0e63510e4
-
SHA512
8cccd87f0a242b0a33df63cd2e8d42105836918a5e6f8f1dfff6df902797dffaf811c516a77d08de8c17bf38e468dcbe4414ce5df966d09679149bf15bb520e8
-
SSDEEP
393216:FV7xxXRWSc4KM+KULHaXVJgy5n2sUgD6YbTyI8PnkUt8BXIPMNW+I:FV7vXRWTfM+K2+VNRNDxtTRU+I
Static task
static1
Behavioral task
behavioral1
Sample
97e3afd871e22aa25530d6f57ba8a31f_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
97e3afd871e22aa25530d6f57ba8a31f_JaffaCakes118.apk
Resource
android-x64-arm64-20240603-en
Malware Config
Targets
-
-
Target
97e3afd871e22aa25530d6f57ba8a31f_JaffaCakes118
-
Size
20.8MB
-
MD5
97e3afd871e22aa25530d6f57ba8a31f
-
SHA1
f9ad4eb601f04da462d20f3671901778e8e9bde1
-
SHA256
d8e3522c497722efe67add2b33b1a7686e00d976bb3749ff64e3f3a0e63510e4
-
SHA512
8cccd87f0a242b0a33df63cd2e8d42105836918a5e6f8f1dfff6df902797dffaf811c516a77d08de8c17bf38e468dcbe4414ce5df966d09679149bf15bb520e8
-
SSDEEP
393216:FV7xxXRWSc4KM+KULHaXVJgy5n2sUgD6YbTyI8PnkUt8BXIPMNW+I:FV7vXRWTfM+K2+VNRNDxtTRU+I
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2