General
-
Target
1542de6835d0a97b7edd7eb2f21aec79_JaffaCakes118
-
Size
1.5MB
-
Sample
240627-jzsmlazfkf
-
MD5
1542de6835d0a97b7edd7eb2f21aec79
-
SHA1
5addc9b49993dd1cc0c7243f00e975c81b5d6135
-
SHA256
f68a71f696c2cf42bc1e6717644d7cbe975435cb28bff24f5dd4328f7f0c22a8
-
SHA512
146e2ae62c1897a6ad505a075498009d058f73ae6e922171b48d1838f196e9883fad445ad7bb66e9a9aebdb8a5a4251502495f8a78cd813226e04c5b00f425a4
-
SSDEEP
49152:wy+a6u1yQfS6pFJoo0Eo9AOOniENtADy3MGI:wx3iSkFJo28OiER8GI
Static task
static1
Behavioral task
behavioral1
Sample
1542de6835d0a97b7edd7eb2f21aec79_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
1542de6835d0a97b7edd7eb2f21aec79_JaffaCakes118
-
Size
1.5MB
-
MD5
1542de6835d0a97b7edd7eb2f21aec79
-
SHA1
5addc9b49993dd1cc0c7243f00e975c81b5d6135
-
SHA256
f68a71f696c2cf42bc1e6717644d7cbe975435cb28bff24f5dd4328f7f0c22a8
-
SHA512
146e2ae62c1897a6ad505a075498009d058f73ae6e922171b48d1838f196e9883fad445ad7bb66e9a9aebdb8a5a4251502495f8a78cd813226e04c5b00f425a4
-
SSDEEP
49152:wy+a6u1yQfS6pFJoo0Eo9AOOniENtADy3MGI:wx3iSkFJo28OiER8GI
Score8/10-
Checks if the Android device is rooted.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-