General
-
Target
a3e6dfeffd6d19f618aa468791dfc705_JaffaCakes118
-
Size
16.6MB
-
Sample
240613-fnve9sverd
-
MD5
a3e6dfeffd6d19f618aa468791dfc705
-
SHA1
43d5da1f41aa9991078fed1ad7153ecae3163f10
-
SHA256
cbb85f45f987994c2f1163ff5e86356703d52e29eb5e0c39550d1a8e546d899a
-
SHA512
3e67b61e8160a91d95dcfc8b807e4027d0ad6190790b231005bfc3085993d6a31c74fa820037e822c83ec9f2ed259ae6c254f6c9fd5e7492b91d8ffb15db5e6c
-
SSDEEP
393216:MPUfODj6f3Pn/5g0bbowjyVL8VuK9Lwjeqzy:MPUWa3Pn/5gG9Pt9Zb
Static task
static1
Behavioral task
behavioral1
Sample
a3e6dfeffd6d19f618aa468791dfc705_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
a3e6dfeffd6d19f618aa468791dfc705_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
a3e6dfeffd6d19f618aa468791dfc705_JaffaCakes118
-
Size
16.6MB
-
MD5
a3e6dfeffd6d19f618aa468791dfc705
-
SHA1
43d5da1f41aa9991078fed1ad7153ecae3163f10
-
SHA256
cbb85f45f987994c2f1163ff5e86356703d52e29eb5e0c39550d1a8e546d899a
-
SHA512
3e67b61e8160a91d95dcfc8b807e4027d0ad6190790b231005bfc3085993d6a31c74fa820037e822c83ec9f2ed259ae6c254f6c9fd5e7492b91d8ffb15db5e6c
-
SSDEEP
393216:MPUfODj6f3Pn/5g0bbowjyVL8VuK9Lwjeqzy:MPUWa3Pn/5gG9Pt9Zb
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-