General
-
Target
a8337e80f82e5f7dd1117088371d7d8c_JaffaCakes118
-
Size
7.5MB
-
Sample
240614-gflzla1cpl
-
MD5
a8337e80f82e5f7dd1117088371d7d8c
-
SHA1
d0376aa680ee202419a41b655db978c48621ae16
-
SHA256
bc0ae276808e67524a3e314f18e9a8091338dc8ce8b04ba32809290c7a2ec5fe
-
SHA512
531a75f2dd589fa4dde29b84ee22c3024b3bbf0cb0f79e8f872bd21cf10c1f1e190ca51398b72328aa0593c8fa0c6ef69d3cfbff9753c3a7595951cf7b02a350
-
SSDEEP
196608:CU2x/QCai+qXMABmW5TObcfa3WUdNNEgU:CU3CafqXM+m0TOQCGUJzU
Static task
static1
Behavioral task
behavioral1
Sample
a8337e80f82e5f7dd1117088371d7d8c_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
a8337e80f82e5f7dd1117088371d7d8c_JaffaCakes118
-
Size
7.5MB
-
MD5
a8337e80f82e5f7dd1117088371d7d8c
-
SHA1
d0376aa680ee202419a41b655db978c48621ae16
-
SHA256
bc0ae276808e67524a3e314f18e9a8091338dc8ce8b04ba32809290c7a2ec5fe
-
SHA512
531a75f2dd589fa4dde29b84ee22c3024b3bbf0cb0f79e8f872bd21cf10c1f1e190ca51398b72328aa0593c8fa0c6ef69d3cfbff9753c3a7595951cf7b02a350
-
SSDEEP
196608:CU2x/QCai+qXMABmW5TObcfa3WUdNNEgU:CU3CafqXM+m0TOQCGUJzU
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-