General
-
Target
939a478aadca94bf92bd4fd9170308f0_JaffaCakes118
-
Size
13.8MB
-
Sample
240813-sh2nlszhne
-
MD5
939a478aadca94bf92bd4fd9170308f0
-
SHA1
8af41a80aad05f85f1121506ee6f217272bcc4f5
-
SHA256
976cc5ec0ff2fa47b69cd0c05c89646220177849f2ad9db459f99f63bbb0cb29
-
SHA512
6b7e77bcde8c4c919def53c8aac7b53dbf2fabda63c506dfe36e86df2936a1743b8401e2cd720e493dcfb34cb61915ab7d1922479c60b90b80c48998aa825802
-
SSDEEP
393216:xKI+wAoQPd3POasnXnTNaEwQm+s52qOBvIE5EibICZ1YPkM:xxKhP9PVEXnAdaVvHJdG
Static task
static1
Behavioral task
behavioral1
Sample
939a478aadca94bf92bd4fd9170308f0_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
939a478aadca94bf92bd4fd9170308f0_JaffaCakes118.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
939a478aadca94bf92bd4fd9170308f0_JaffaCakes118
-
Size
13.8MB
-
MD5
939a478aadca94bf92bd4fd9170308f0
-
SHA1
8af41a80aad05f85f1121506ee6f217272bcc4f5
-
SHA256
976cc5ec0ff2fa47b69cd0c05c89646220177849f2ad9db459f99f63bbb0cb29
-
SHA512
6b7e77bcde8c4c919def53c8aac7b53dbf2fabda63c506dfe36e86df2936a1743b8401e2cd720e493dcfb34cb61915ab7d1922479c60b90b80c48998aa825802
-
SSDEEP
393216:xKI+wAoQPd3POasnXnTNaEwQm+s52qOBvIE5EibICZ1YPkM:xxKhP9PVEXnAdaVvHJdG
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-