General
-
Target
2eb664282d38fcc239db9fcd56bf2dc3_JaffaCakes118
-
Size
1.3MB
-
Sample
240709-c6ldjavbqd
-
MD5
2eb664282d38fcc239db9fcd56bf2dc3
-
SHA1
c522d9ea9ddd28b8e2656f172cb01b347d2679ce
-
SHA256
d2be660b8c71a35f85ec5a50981d952e78c77f83cfa092c75a254301f7e97313
-
SHA512
6f8048a0a35f7e9258e88b06803fb76f0c9ffa9a6b3a458f48c6b3829c43f63c21668b13bf9e076cea35aac7e767af594b96867df682bed49249fa785b768fe8
-
SSDEEP
24576:Ee8yQL5SbyDI8PPwZLDGfVt+dDn/0JZ5ISsnC0JEqoA/Rq4:EeBQJDI8PoZm+T/0X5IHQ5I44
Static task
static1
Behavioral task
behavioral1
Sample
2eb664282d38fcc239db9fcd56bf2dc3_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
2eb664282d38fcc239db9fcd56bf2dc3_JaffaCakes118.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
2eb664282d38fcc239db9fcd56bf2dc3_JaffaCakes118
-
Size
1.3MB
-
MD5
2eb664282d38fcc239db9fcd56bf2dc3
-
SHA1
c522d9ea9ddd28b8e2656f172cb01b347d2679ce
-
SHA256
d2be660b8c71a35f85ec5a50981d952e78c77f83cfa092c75a254301f7e97313
-
SHA512
6f8048a0a35f7e9258e88b06803fb76f0c9ffa9a6b3a458f48c6b3829c43f63c21668b13bf9e076cea35aac7e767af594b96867df682bed49249fa785b768fe8
-
SSDEEP
24576:Ee8yQL5SbyDI8PPwZLDGfVt+dDn/0JZ5ISsnC0JEqoA/Rq4:EeBQJDI8PoZm+T/0X5IHQ5I44
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-