General
-
Target
9fd5f93ca010ef9cd0b30cd31e118ab8_JaffaCakes118
-
Size
4.6MB
-
Sample
240612-htvpbstdmh
-
MD5
9fd5f93ca010ef9cd0b30cd31e118ab8
-
SHA1
24eac38acc330ccdbba2aef419c69dc445928b36
-
SHA256
7bd41ab31f0173f481007ca43cf7da2cec103014eda7772bc341e0945bb87e12
-
SHA512
0fc9b6c1e07df326578818a12de2c1f9846a4a32bdd5aa2b9f83314d267dca8384148ad78903269708ca322da8065ad36c83be9747b5a7008d94d90d22a35314
-
SSDEEP
98304:PDSqeOcxqHXsgokwcQLfYAZYf/UNvqkevKGsLoa:PemLzo2GhZYfwqkUMd
Static task
static1
Behavioral task
behavioral1
Sample
9fd5f93ca010ef9cd0b30cd31e118ab8_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
9fd5f93ca010ef9cd0b30cd31e118ab8_JaffaCakes118
-
Size
4.6MB
-
MD5
9fd5f93ca010ef9cd0b30cd31e118ab8
-
SHA1
24eac38acc330ccdbba2aef419c69dc445928b36
-
SHA256
7bd41ab31f0173f481007ca43cf7da2cec103014eda7772bc341e0945bb87e12
-
SHA512
0fc9b6c1e07df326578818a12de2c1f9846a4a32bdd5aa2b9f83314d267dca8384148ad78903269708ca322da8065ad36c83be9747b5a7008d94d90d22a35314
-
SSDEEP
98304:PDSqeOcxqHXsgokwcQLfYAZYf/UNvqkevKGsLoa:PemLzo2GhZYfwqkUMd
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Reads the content of the call log.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Changes the wallpaper (common with ransomware activity)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2