General
-
Target
ad5a70706be4aeab629291ba58aea57d_JaffaCakes118
-
Size
6.1MB
-
Sample
240820-bq4z9swgke
-
MD5
ad5a70706be4aeab629291ba58aea57d
-
SHA1
22287ad276db1897247999c1323433c85d90d1af
-
SHA256
b07ba1c3c75dcbc3b940fdb5600acd75b6ff4c093af3e907734727170540025a
-
SHA512
58e76d9cdb369ae3425590334799a63a2e9b921aa34ac7b19d8f5ae5539a92c90a45e3f6518d9f40ef82927f3b65f18f9959d4bd37361231e81db89dd8eb3449
-
SSDEEP
196608:elWVGbqBk+aw+yrONA2wq+6m/u0ESHVT7:elWgQk+aUON9h+TzE0T7
Static task
static1
Behavioral task
behavioral1
Sample
ad5a70706be4aeab629291ba58aea57d_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
ad5a70706be4aeab629291ba58aea57d_JaffaCakes118.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
ad5a70706be4aeab629291ba58aea57d_JaffaCakes118
-
Size
6.1MB
-
MD5
ad5a70706be4aeab629291ba58aea57d
-
SHA1
22287ad276db1897247999c1323433c85d90d1af
-
SHA256
b07ba1c3c75dcbc3b940fdb5600acd75b6ff4c093af3e907734727170540025a
-
SHA512
58e76d9cdb369ae3425590334799a63a2e9b921aa34ac7b19d8f5ae5539a92c90a45e3f6518d9f40ef82927f3b65f18f9959d4bd37361231e81db89dd8eb3449
-
SSDEEP
196608:elWVGbqBk+aw+yrONA2wq+6m/u0ESHVT7:elWgQk+aUON9h+TzE0T7
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-