General
-
Target
a10226cc7dc8dca1163180401382a86b_JaffaCakes118
-
Size
31.6MB
-
Sample
240612-rxy1lasclr
-
MD5
a10226cc7dc8dca1163180401382a86b
-
SHA1
d07307fda96e0ad80077b69ca398743fcee92cc7
-
SHA256
6aa0f50bbad47fbc96ea4c063dc1ca43506e013ab8cd67cdf31b99216eded23a
-
SHA512
8449f4854670230ea2142b0030ec7182606e1d21b59ef70b5daa5fb580bfed0167057b2e9ccfa4598bb76dc214997c144f58bac9fe4a92667fb38bcdc2943ac6
-
SSDEEP
786432:FF/mqWa4d2QSzYc/ZGj43mjN99UC/nvvLBn2s6DD8D:Dm5Nd2QSj/faEenvvghU
Static task
static1
Behavioral task
behavioral1
Sample
a10226cc7dc8dca1163180401382a86b_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
a10226cc7dc8dca1163180401382a86b_JaffaCakes118.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
a10226cc7dc8dca1163180401382a86b_JaffaCakes118
-
Size
31.6MB
-
MD5
a10226cc7dc8dca1163180401382a86b
-
SHA1
d07307fda96e0ad80077b69ca398743fcee92cc7
-
SHA256
6aa0f50bbad47fbc96ea4c063dc1ca43506e013ab8cd67cdf31b99216eded23a
-
SHA512
8449f4854670230ea2142b0030ec7182606e1d21b59ef70b5daa5fb580bfed0167057b2e9ccfa4598bb76dc214997c144f58bac9fe4a92667fb38bcdc2943ac6
-
SSDEEP
786432:FF/mqWa4d2QSzYc/ZGj43mjN99UC/nvvLBn2s6DD8D:Dm5Nd2QSj/faEenvvghU
-
Checks if the Android device is rooted.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
2System Checks
2