General
-
Target
9f236e0d39f042b69f4e493b86061ee1_JaffaCakes118
-
Size
13.5MB
-
Sample
240611-w3tehswhlk
-
MD5
9f236e0d39f042b69f4e493b86061ee1
-
SHA1
4a10ce8b471fbb2f783d269d7ae5a2581fc7dc48
-
SHA256
85040f1ca529f8e8b40f465bb9246524c468d9847a2d615944530107d80cbb66
-
SHA512
657b6979fa8448da1d8f11d7e3b4ba065354bb2664fb11cc3437cb624760d1ddac549b09331a88fe2ee9b482a5d5b74563c99363eb409d70eba39f3c16c6b4af
-
SSDEEP
393216:QJw8mGyA+tslOmaJ2yvIblwRhj2YuBj13SphzWp:j86tsYrUlWj2Yud13SL6p
Static task
static1
Behavioral task
behavioral1
Sample
9f236e0d39f042b69f4e493b86061ee1_JaffaCakes118.apk
Resource
android-x86-arm-20240611-en
Behavioral task
behavioral2
Sample
9f236e0d39f042b69f4e493b86061ee1_JaffaCakes118.apk
Resource
android-x64-arm64-20240611-en
Behavioral task
behavioral3
Sample
gdtadv2.apk
Resource
android-x86-arm-20240611-en
Malware Config
Targets
-
-
Target
9f236e0d39f042b69f4e493b86061ee1_JaffaCakes118
-
Size
13.5MB
-
MD5
9f236e0d39f042b69f4e493b86061ee1
-
SHA1
4a10ce8b471fbb2f783d269d7ae5a2581fc7dc48
-
SHA256
85040f1ca529f8e8b40f465bb9246524c468d9847a2d615944530107d80cbb66
-
SHA512
657b6979fa8448da1d8f11d7e3b4ba065354bb2664fb11cc3437cb624760d1ddac549b09331a88fe2ee9b482a5d5b74563c99363eb409d70eba39f3c16c6b4af
-
SSDEEP
393216:QJw8mGyA+tslOmaJ2yvIblwRhj2YuBj13SphzWp:j86tsYrUlWj2Yud13SL6p
-
Checks if the Android device is rooted.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-
-
-
Target
gdtadv2.jar
-
Size
639KB
-
MD5
2a790fd5de797b91ec2039008c6b5e0e
-
SHA1
5c28490eee21201bc596c1ca4c9bb546c5be7393
-
SHA256
80681ec3d7b66ba02b3baaec467c90c75fd21d4d9eed3370e3e7a1a717bb454a
-
SHA512
82b89bf7320802e26f55d6aa6b8f4056821f9159389e9ebff6ec3075daf8cda30d2a7449047310e64370be84b5cc1f9b9dc3e252582afb508129abd1c08b9c6c
-
SSDEEP
12288:Oqo1h48mUSsielxZE3OdKzoFs3rAn26iwpYGIDD5tw/wDwkG3:Oq8h4CSs9xZjwrO28YGotw4cV
Score1/10 -