General
-
Target
9fde494c6c37348c45a6db871337bec3_JaffaCakes118
-
Size
20.3MB
-
Sample
240612-h3ttdstfqg
-
MD5
9fde494c6c37348c45a6db871337bec3
-
SHA1
bf689ca7fecf9c8bb310c319b7348eb4a784019d
-
SHA256
caa61c5094acf2b80dd798100657cd243dcefa847df602fcd3ad224ed53867ac
-
SHA512
0d816e6f60f0edabbb7bdd71f485dad6aab762a4784a42a15d475664dec0f5d74a6b0aef266ed2205ce4a6a299ec4238aaaf79282339b289e38d926e6af4d680
-
SSDEEP
393216:25wPMAAe2Uj5wFdnwCyfQ7oh0tlXpAIFdRzf2zFCEE8TY9IJDluvZ/PICOafD:25wRD2USnwCjXpAIbRzDEmIJxq1PICOS
Static task
static1
Behavioral task
behavioral1
Sample
9fde494c6c37348c45a6db871337bec3_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
9fde494c6c37348c45a6db871337bec3_JaffaCakes118
-
Size
20.3MB
-
MD5
9fde494c6c37348c45a6db871337bec3
-
SHA1
bf689ca7fecf9c8bb310c319b7348eb4a784019d
-
SHA256
caa61c5094acf2b80dd798100657cd243dcefa847df602fcd3ad224ed53867ac
-
SHA512
0d816e6f60f0edabbb7bdd71f485dad6aab762a4784a42a15d475664dec0f5d74a6b0aef266ed2205ce4a6a299ec4238aaaf79282339b289e38d926e6af4d680
-
SSDEEP
393216:25wPMAAe2Uj5wFdnwCyfQ7oh0tlXpAIFdRzf2zFCEE8TY9IJDluvZ/PICOafD:25wRD2USnwCjXpAIbRzDEmIJxq1PICOS
Score7/10-
Checks Android system properties for emulator presence.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Reads the content of photos stored on the user's device.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-