General
-
Target
c24a0ed0d2f205ed675904d46d56453e_JaffaCakes118
-
Size
18.5MB
-
Sample
240826-e6lemswhrk
-
MD5
c24a0ed0d2f205ed675904d46d56453e
-
SHA1
906723e1c01d20e9a9022516afcf1aedcb372614
-
SHA256
4cdb139dbaf627b88f79cebea3ec17f20e51e7474970d55288b040d7c7070f4a
-
SHA512
a5bf54007d1fb1febfcfe20f292d34a14e9f2afe3d21ec0aaa758c0d34ba4234c034a512b1c0cfae8a5826755c71ba00880956db73fdd06ecbf4ef5588331b31
-
SSDEEP
393216:KQ94ZaLDObycu63yJocUazxzr2rzBY7TJXBs8XNxadrAMmm:YofO+cuRJtUazx3Qz+TBB/s
Static task
static1
Behavioral task
behavioral1
Sample
c24a0ed0d2f205ed675904d46d56453e_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
c24a0ed0d2f205ed675904d46d56453e_JaffaCakes118
-
Size
18.5MB
-
MD5
c24a0ed0d2f205ed675904d46d56453e
-
SHA1
906723e1c01d20e9a9022516afcf1aedcb372614
-
SHA256
4cdb139dbaf627b88f79cebea3ec17f20e51e7474970d55288b040d7c7070f4a
-
SHA512
a5bf54007d1fb1febfcfe20f292d34a14e9f2afe3d21ec0aaa758c0d34ba4234c034a512b1c0cfae8a5826755c71ba00880956db73fdd06ecbf4ef5588331b31
-
SSDEEP
393216:KQ94ZaLDObycu63yJocUazxzr2rzBY7TJXBs8XNxadrAMmm:YofO+cuRJtUazx3Qz+TBB/s
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-