General
-
Target
9aa0e786e3917e9c97bf68246c042a6f_JaffaCakes118
-
Size
13.4MB
-
Sample
240610-pelw7sba76
-
MD5
9aa0e786e3917e9c97bf68246c042a6f
-
SHA1
b7e2751cfd0f923ce0d5ae854af61da5095de41a
-
SHA256
db06ed5e6637ff22be77e5fff45ed82fb0869f687da61672705d9b89112e3ed8
-
SHA512
d0ccbb2ed9f4b3f4b458e21e4c61e911f7d4cddba9074c75ab781f3d5d58e57dbb7a672f88d8e1ff07f37fb6df79f2a1d25d71c0e9c866b096427b4c431c4209
-
SSDEEP
393216:E/GqygQJLeDisrn2bBqDz5RAtXP9P02NcmOhd9JULT:s5ygQyGsrwc5R2BpTEJs
Static task
static1
Behavioral task
behavioral1
Sample
9aa0e786e3917e9c97bf68246c042a6f_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
9aa0e786e3917e9c97bf68246c042a6f_JaffaCakes118.apk
Resource
android-x64-arm64-20240603-en
Behavioral task
behavioral3
Sample
UPPayPluginEx.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral4
Sample
UPPayPluginEx.apk
Resource
android-x64-arm64-20240603-en
Malware Config
Targets
-
-
Target
9aa0e786e3917e9c97bf68246c042a6f_JaffaCakes118
-
Size
13.4MB
-
MD5
9aa0e786e3917e9c97bf68246c042a6f
-
SHA1
b7e2751cfd0f923ce0d5ae854af61da5095de41a
-
SHA256
db06ed5e6637ff22be77e5fff45ed82fb0869f687da61672705d9b89112e3ed8
-
SHA512
d0ccbb2ed9f4b3f4b458e21e4c61e911f7d4cddba9074c75ab781f3d5d58e57dbb7a672f88d8e1ff07f37fb6df79f2a1d25d71c0e9c866b096427b4c431c4209
-
SSDEEP
393216:E/GqygQJLeDisrn2bBqDz5RAtXP9P02NcmOhd9JULT:s5ygQyGsrwc5R2BpTEJs
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
-
-
Target
UPPayPluginEx.apk
-
Size
847KB
-
MD5
d75bb2802e61738a9a03bf014f927d9a
-
SHA1
dcb43893dd5211c842118daadaa191bdeda7c16d
-
SHA256
2487ccc3a54b6e65bccb4961f6c28601be373162b9f17d1818c33fe54f799fe9
-
SHA512
7fe6872bdf5366c2084e794efc3d067de9e11e475631997ea57b57313b84116ee625c8678778a15427a63f51a450ffd9102bd09c12ade437fee7176177812df6
-
SSDEEP
12288:vKeuG5BeFpM6Jmy+dPSEdUK4dCIhKLm+byH2C84ApQXM2kkBOzdZ+eqOEveLEiAy:vKhGDui6JEmKaCIT8wkkkTqOEUE5gnt
Score1/10 -