General
-
Target
42aeff0ece457ac6f492914cd0eb53dc_JaffaCakes118
-
Size
6.8MB
-
Sample
240713-v8rbns1alk
-
MD5
42aeff0ece457ac6f492914cd0eb53dc
-
SHA1
ea24f3b198d6c392942b9c25abbc5124810bf171
-
SHA256
56f8dca82c21a33b71fd208d9dbab3ffc6bcf01dbcfa9616e789ef76e9341f71
-
SHA512
a88f903445173209186400c3c2ed1dded88b83571d3f73d049c30d3a179e24be323cfc419985b9963707df9353020a03b85e746df9f33c71eca2c0f297feb066
-
SSDEEP
98304:n8cWzT4cpaLoW5oAD14z7IJ6HKoIHcoYdWGd9jxtCphgrTsnTWbct6S7gYHPxke:aQeCWTYJIIHcPDPkOoactF7gYHPae
Static task
static1
Behavioral task
behavioral1
Sample
42aeff0ece457ac6f492914cd0eb53dc_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
42aeff0ece457ac6f492914cd0eb53dc_JaffaCakes118.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
42aeff0ece457ac6f492914cd0eb53dc_JaffaCakes118
-
Size
6.8MB
-
MD5
42aeff0ece457ac6f492914cd0eb53dc
-
SHA1
ea24f3b198d6c392942b9c25abbc5124810bf171
-
SHA256
56f8dca82c21a33b71fd208d9dbab3ffc6bcf01dbcfa9616e789ef76e9341f71
-
SHA512
a88f903445173209186400c3c2ed1dded88b83571d3f73d049c30d3a179e24be323cfc419985b9963707df9353020a03b85e746df9f33c71eca2c0f297feb066
-
SSDEEP
98304:n8cWzT4cpaLoW5oAD14z7IJ6HKoIHcoYdWGd9jxtCphgrTsnTWbct6S7gYHPxke:aQeCWTYJIIHcPDPkOoactF7gYHPae
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-