General
-
Target
b54350c52dd2d16099232d039f116a6a_JaffaCakes118
-
Size
14.2MB
-
Sample
240821-17qlmstdqa
-
MD5
b54350c52dd2d16099232d039f116a6a
-
SHA1
67ae60794623ec3fc565711c4d9fa276fbff44fe
-
SHA256
5824e33e3bca79ba8ce955e83f610e8ff3401e0e6f46efabc26bc496e97a1071
-
SHA512
9e0361bfcbf3e668c34b01f57c05e2cb41c36426194d557dfea3044fc458744a8807ca55ecf3d7a025f37f9fae6e9e286dc2152fd45a1bcc40a7a3e95d3ea88e
-
SSDEEP
393216:3x2QCKXTOwUcNNG4XCb0ddOEl75RkhfPll4gVJIoORDH:3xLOsnxrunbJVzORDH
Static task
static1
Behavioral task
behavioral1
Sample
b54350c52dd2d16099232d039f116a6a_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
b54350c52dd2d16099232d039f116a6a_JaffaCakes118.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
b54350c52dd2d16099232d039f116a6a_JaffaCakes118
-
Size
14.2MB
-
MD5
b54350c52dd2d16099232d039f116a6a
-
SHA1
67ae60794623ec3fc565711c4d9fa276fbff44fe
-
SHA256
5824e33e3bca79ba8ce955e83f610e8ff3401e0e6f46efabc26bc496e97a1071
-
SHA512
9e0361bfcbf3e668c34b01f57c05e2cb41c36426194d557dfea3044fc458744a8807ca55ecf3d7a025f37f9fae6e9e286dc2152fd45a1bcc40a7a3e95d3ea88e
-
SSDEEP
393216:3x2QCKXTOwUcNNG4XCb0ddOEl75RkhfPll4gVJIoORDH:3xLOsnxrunbJVzORDH
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-