General
-
Target
a3e574122b0146d9be60feab2c532c29_JaffaCakes118
-
Size
31.1MB
-
Sample
240613-fl7mtayekj
-
MD5
a3e574122b0146d9be60feab2c532c29
-
SHA1
e59dd8e8e99016384baa8e78c61bee82a3e11402
-
SHA256
dbd3ed439189d9c51bbd915d2d4592b340595a4c307ce76121e4fcd756edff58
-
SHA512
8ce0839c035b8fd0cfa7a8bb9e6df1c7d9ea06772c77431f3c66bab996f81e72c5aaa8f0b61034802825f118f013fdb300365bff0ced55d00d24d6b58f813a66
-
SSDEEP
786432:/cvXFuGFWYb/FS+fiof6cEp6vz1A32rpNm+cVsWEke+wPE9CrvI7H3Ehh0cbx:0vXFuGFWkviDcEp6Lm3oNmVVTEADCSX4
Static task
static1
Behavioral task
behavioral1
Sample
a3e574122b0146d9be60feab2c532c29_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
a3e574122b0146d9be60feab2c532c29_JaffaCakes118
-
Size
31.1MB
-
MD5
a3e574122b0146d9be60feab2c532c29
-
SHA1
e59dd8e8e99016384baa8e78c61bee82a3e11402
-
SHA256
dbd3ed439189d9c51bbd915d2d4592b340595a4c307ce76121e4fcd756edff58
-
SHA512
8ce0839c035b8fd0cfa7a8bb9e6df1c7d9ea06772c77431f3c66bab996f81e72c5aaa8f0b61034802825f118f013fdb300365bff0ced55d00d24d6b58f813a66
-
SSDEEP
786432:/cvXFuGFWYb/FS+fiof6cEp6vz1A32rpNm+cVsWEke+wPE9CrvI7H3Ehh0cbx:0vXFuGFWkviDcEp6Lm3oNmVVTEADCSX4
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Reads information about phone network operator.
-