General
-
Target
986d98fe4634feb42992b1c03d1c88ca_JaffaCakes118
-
Size
19.9MB
-
Sample
240605-r3f2zahh7w
-
MD5
986d98fe4634feb42992b1c03d1c88ca
-
SHA1
03de0fb4957bed4f4d14a1f69d3974299c38ac78
-
SHA256
108d676fce87a2ff5921497f3c49b0caa8c1b8994015d7096a2ed665a896e591
-
SHA512
570f79b833eccaa69b5e8bc4f7aa4620a4f4877eab4077540205aae3280f2cd080992ff54fbc09882f617979642a52c0d4a56d0b334fb2b38fa8cfb227b6cc52
-
SSDEEP
393216:MSyMCPDBa+wm1JcPP3Q+92o/H5nh/LQc7XIqyzAOX9MTwx0iVNb2II:MWKDDW192oTLxIZAOX9MTwHK
Static task
static1
Behavioral task
behavioral1
Sample
986d98fe4634feb42992b1c03d1c88ca_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
986d98fe4634feb42992b1c03d1c88ca_JaffaCakes118.apk
Resource
android-x64-20240603-en
Malware Config
Targets
-
-
Target
986d98fe4634feb42992b1c03d1c88ca_JaffaCakes118
-
Size
19.9MB
-
MD5
986d98fe4634feb42992b1c03d1c88ca
-
SHA1
03de0fb4957bed4f4d14a1f69d3974299c38ac78
-
SHA256
108d676fce87a2ff5921497f3c49b0caa8c1b8994015d7096a2ed665a896e591
-
SHA512
570f79b833eccaa69b5e8bc4f7aa4620a4f4877eab4077540205aae3280f2cd080992ff54fbc09882f617979642a52c0d4a56d0b334fb2b38fa8cfb227b6cc52
-
SSDEEP
393216:MSyMCPDBa+wm1JcPP3Q+92o/H5nh/LQc7XIqyzAOX9MTwx0iVNb2II:MWKDDW192oTLxIZAOX9MTwHK
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-