General
-
Target
9931f48ef055cb08714d8ddf56c8e15b_JaffaCakes118
-
Size
22.3MB
-
Sample
240605-zfzjssha21
-
MD5
9931f48ef055cb08714d8ddf56c8e15b
-
SHA1
f202e6f374bf292665bc165e4e5582491a19650f
-
SHA256
a9ddb9e0b95e80cc1e4d9d75f8379377a4c027be1280e59e6d87d6337b1d6b60
-
SHA512
0b49af9a4aea1633111da8f99477124909db927d91362a0d4bdd34226496c3005a5261294a97fa550c66220ffabf54c21e601d2e2ed0d4715d1c76660ad590dd
-
SSDEEP
393216:9Yb0gdJPjiJKnOJuLqEmEs1NQnu0RE067Ks2Y9gdTI+hianFvrne0T/gW68JHiRS:9YfTjTnOJuhmEs1pBAMq7pC4gWUfqFhz
Static task
static1
Behavioral task
behavioral1
Sample
9931f48ef055cb08714d8ddf56c8e15b_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
pujia_c.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral3
Sample
pujia_c.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral4
Sample
pujia_c.apk
Resource
android-x64-arm64-20240603-en
Malware Config
Targets
-
-
Target
9931f48ef055cb08714d8ddf56c8e15b_JaffaCakes118
-
Size
22.3MB
-
MD5
9931f48ef055cb08714d8ddf56c8e15b
-
SHA1
f202e6f374bf292665bc165e4e5582491a19650f
-
SHA256
a9ddb9e0b95e80cc1e4d9d75f8379377a4c027be1280e59e6d87d6337b1d6b60
-
SHA512
0b49af9a4aea1633111da8f99477124909db927d91362a0d4bdd34226496c3005a5261294a97fa550c66220ffabf54c21e601d2e2ed0d4715d1c76660ad590dd
-
SSDEEP
393216:9Yb0gdJPjiJKnOJuLqEmEs1NQnu0RE067Ks2Y9gdTI+hianFvrne0T/gW68JHiRS:9YfTjTnOJuhmEs1pBAMq7pC4gWUfqFhz
Score7/10-
Checks Android system properties for emulator presence.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
-
-
Target
pujia_c
-
Size
255KB
-
MD5
d527f86cb79d742f060595d9bc42667a
-
SHA1
e24bcbb3e880dea3668c7d68d92b6005dd623cf4
-
SHA256
609d53ae71190c4f12446cddf13a94e0be0f3ba368070112c96e50e950b35f85
-
SHA512
af5eda0865fa797f71c0d5316396e84c01b19c4f059e997abea4384b7db0d6a93f9ba01a346a7450b93c3c12ba21c56314c59e1cccc702e05409cb378d283164
-
SSDEEP
6144:/p9BMt3ThhyTp06UXU3+damtJdFCOxJXZ/bVbsmIoR1TLKi+5v9:Va336UXg+dnP3rZbtR1Tl2v9
Score1/10 -
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
3System Checks
3