General
-
Target
9d33d89cf09814bc9ab2b79015225ad9_JaffaCakes118
-
Size
502KB
-
Sample
240611-gpab6axelj
-
MD5
9d33d89cf09814bc9ab2b79015225ad9
-
SHA1
06f120b40d51880db5b9279f07f29470333d49f5
-
SHA256
e8bf71be02aee39e145afa4801280d8bd2647f54ce1b758af294e761beeda66c
-
SHA512
70bbb1f3b051eca70dbc2bfb0c8c9e3be34de96828fac334cbaacf236f8eb88491294298d3cf5644815597e45c007fea90778348316d1c69fdc16f28cff004e8
-
SSDEEP
12288:Skg525N6i4HSpZhDyWRY5T+Tp3ndLNO9/:y52XpZhlReOLgN
Static task
static1
Behavioral task
behavioral1
Sample
9d33d89cf09814bc9ab2b79015225ad9_JaffaCakes118.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
9d33d89cf09814bc9ab2b79015225ad9_JaffaCakes118.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral3
Sample
9d33d89cf09814bc9ab2b79015225ad9_JaffaCakes118.apk
Resource
android-x64-arm64-20240603-en
Malware Config
Targets
-
-
Target
9d33d89cf09814bc9ab2b79015225ad9_JaffaCakes118
-
Size
502KB
-
MD5
9d33d89cf09814bc9ab2b79015225ad9
-
SHA1
06f120b40d51880db5b9279f07f29470333d49f5
-
SHA256
e8bf71be02aee39e145afa4801280d8bd2647f54ce1b758af294e761beeda66c
-
SHA512
70bbb1f3b051eca70dbc2bfb0c8c9e3be34de96828fac334cbaacf236f8eb88491294298d3cf5644815597e45c007fea90778348316d1c69fdc16f28cff004e8
-
SSDEEP
12288:Skg525N6i4HSpZhDyWRY5T+Tp3ndLNO9/:y52XpZhlReOLgN
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-