General
-
Target
e0d83b5a8506d10811524c311ecc476c_JaffaCakes118
-
Size
10.6MB
-
Sample
240914-xs5kgazhkq
-
MD5
e0d83b5a8506d10811524c311ecc476c
-
SHA1
05acd313f3428f8395c493117edd69093933a4af
-
SHA256
63eec91e34b202ee2f9e54c7902715f5837e55859d67c150dd9e5976139b62d8
-
SHA512
a99fb0c62e07c8cae68490da4fc28b5ae1da20d1fb196f9baf69d078066d0f542059b618c1b8ff455002c7c6a064e5f528774744807606999bd27f5e92c397d6
-
SSDEEP
196608:SsOEwis1RLWy/wOQOk5J5EhU5TlQZGBWk/02hwSxiIht9HrrrrrrRI1IkTv2byk:RwisHCaKOkS+HDRri2PHrrrrrrK1IkTk
Static task
static1
Behavioral task
behavioral1
Sample
e0d83b5a8506d10811524c311ecc476c_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
e0d83b5a8506d10811524c311ecc476c_JaffaCakes118
-
Size
10.6MB
-
MD5
e0d83b5a8506d10811524c311ecc476c
-
SHA1
05acd313f3428f8395c493117edd69093933a4af
-
SHA256
63eec91e34b202ee2f9e54c7902715f5837e55859d67c150dd9e5976139b62d8
-
SHA512
a99fb0c62e07c8cae68490da4fc28b5ae1da20d1fb196f9baf69d078066d0f542059b618c1b8ff455002c7c6a064e5f528774744807606999bd27f5e92c397d6
-
SSDEEP
196608:SsOEwis1RLWy/wOQOk5J5EhU5TlQZGBWk/02hwSxiIht9HrrrrrrRI1IkTv2byk:RwisHCaKOkS+HDRri2PHrrrrrrK1IkTk
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Queries information about active data network
-
Reads information about phone network operator.
-