General
-
Target
9adf4d4c019954b1ccced98c8c5b8d7a_JaffaCakes118
-
Size
16.6MB
-
Sample
240610-q36f7axhla
-
MD5
9adf4d4c019954b1ccced98c8c5b8d7a
-
SHA1
6e9e7badc4f775db56246c59010f8f91ef8a815e
-
SHA256
36115cf9ad195a3624b382421b888c05ea7cf0930adc46b19f354f8b8146ffe5
-
SHA512
594e38e89783ac7b9b0f75094d19c8e29868e0dd2b21c0673201ac4708d66e4688d2261e56f821a8588534504c8f939219256a1a182afeb1d0a91a6984d83176
-
SSDEEP
393216:raPRZQRzK7+l/6romj2VL8bu59LwkeqrOiA5:raPWuSlCnTU9Y7f
Static task
static1
Behavioral task
behavioral1
Sample
9adf4d4c019954b1ccced98c8c5b8d7a_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
9adf4d4c019954b1ccced98c8c5b8d7a_JaffaCakes118.apk
Resource
android-x64-20240603-en
Malware Config
Targets
-
-
Target
9adf4d4c019954b1ccced98c8c5b8d7a_JaffaCakes118
-
Size
16.6MB
-
MD5
9adf4d4c019954b1ccced98c8c5b8d7a
-
SHA1
6e9e7badc4f775db56246c59010f8f91ef8a815e
-
SHA256
36115cf9ad195a3624b382421b888c05ea7cf0930adc46b19f354f8b8146ffe5
-
SHA512
594e38e89783ac7b9b0f75094d19c8e29868e0dd2b21c0673201ac4708d66e4688d2261e56f821a8588534504c8f939219256a1a182afeb1d0a91a6984d83176
-
SSDEEP
393216:raPRZQRzK7+l/6romj2VL8bu59LwkeqrOiA5:raPWuSlCnTU9Y7f
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2