General
-
Target
2341578500e6d4ea1e38d80a52529aa1_JaffaCakes118
-
Size
7.7MB
-
Sample
240703-whhghs1bqr
-
MD5
2341578500e6d4ea1e38d80a52529aa1
-
SHA1
d7204079259bda4febf3a9bed5d16d82e5521fe2
-
SHA256
4b1f36973cbb8506e358db78aabd00b51f3af3eba7e03f8dc04894f8c2350319
-
SHA512
c860480d766f409374923bcc7cb6931b93cd0d9a6b8e7eafd2979e9c7f3303c7380668145b1c2cf6853dc847dd0f44340b92b974d02da5226f06bc421642834a
-
SSDEEP
196608:UYJoVYCoLRtMzG+YTiIPRGcyBJHip1OMNT6S:ULYvRqq+iiIP+ip1OMF6S
Static task
static1
Behavioral task
behavioral1
Sample
2341578500e6d4ea1e38d80a52529aa1_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
2341578500e6d4ea1e38d80a52529aa1_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
2341578500e6d4ea1e38d80a52529aa1_JaffaCakes118
-
Size
7.7MB
-
MD5
2341578500e6d4ea1e38d80a52529aa1
-
SHA1
d7204079259bda4febf3a9bed5d16d82e5521fe2
-
SHA256
4b1f36973cbb8506e358db78aabd00b51f3af3eba7e03f8dc04894f8c2350319
-
SHA512
c860480d766f409374923bcc7cb6931b93cd0d9a6b8e7eafd2979e9c7f3303c7380668145b1c2cf6853dc847dd0f44340b92b974d02da5226f06bc421642834a
-
SSDEEP
196608:UYJoVYCoLRtMzG+YTiIPRGcyBJHip1OMNT6S:ULYvRqq+iiIP+ip1OMF6S
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Checks the presence of a debugger
-