General
-
Target
b4c6b383e262e14182ad09d91bd7e70a_JaffaCakes118
-
Size
5.7MB
-
Sample
240616-xzy19sxfjk
-
MD5
b4c6b383e262e14182ad09d91bd7e70a
-
SHA1
4b5940ae51498243dc8cbc371ea5563a8f0f1c3a
-
SHA256
29b48fb0b4dbddb296a29db4d170a0db8b0292bbb54d3366be692de4e6024525
-
SHA512
774f6f2326fce794735ab415a54fe63c70272e82dbee139bfe6182a31574856296d47387c7dd755ebaddd139ecfcefeb8348a5054a39b7e1d8ae6c9b5d2cc310
-
SSDEEP
98304:hrN3jgDXGmAVDGByJBuIOGYmwUypXRf+/GS4aAvCQhnq9hIwDDZ4uv4L6b7v:lNUixcyKvmwUypXRfWVAvCsn+WwXrALG
Static task
static1
Behavioral task
behavioral1
Sample
b4c6b383e262e14182ad09d91bd7e70a_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
b4c6b383e262e14182ad09d91bd7e70a_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
Malware Config
Targets
-
-
Target
b4c6b383e262e14182ad09d91bd7e70a_JaffaCakes118
-
Size
5.7MB
-
MD5
b4c6b383e262e14182ad09d91bd7e70a
-
SHA1
4b5940ae51498243dc8cbc371ea5563a8f0f1c3a
-
SHA256
29b48fb0b4dbddb296a29db4d170a0db8b0292bbb54d3366be692de4e6024525
-
SHA512
774f6f2326fce794735ab415a54fe63c70272e82dbee139bfe6182a31574856296d47387c7dd755ebaddd139ecfcefeb8348a5054a39b7e1d8ae6c9b5d2cc310
-
SSDEEP
98304:hrN3jgDXGmAVDGByJBuIOGYmwUypXRf+/GS4aAvCQhnq9hIwDDZ4uv4L6b7v:lNUixcyKvmwUypXRfWVAvCsn+WwXrALG
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Checks the presence of a debugger
-