General
-
Target
efc04ade17b84a4bc1f48e548ca58e3c_JaffaCakes118
-
Size
31.8MB
-
Sample
240921-n71ema1gjj
-
MD5
efc04ade17b84a4bc1f48e548ca58e3c
-
SHA1
aaee98274a1b62e345d12d383f5a82d795f3725f
-
SHA256
d2510f1e716c596dc74c9916f7054ed185fffea956b40faac0ba3ccb960f7afe
-
SHA512
729d256fa9dd76753009c5f066317a73dece23a905ad9bd184291de9faabd03a8fd541f4ec3b98709e8b3b6cc1994b54afd1029bb2eb5b8deeafcde141a5ceb2
-
SSDEEP
786432:Ui/yvZ3ERQTw9mYMDqf1UXDKeWPQye0x8muybkTP:Ui/yvZnw9mYgTKNP3qP
Static task
static1
Behavioral task
behavioral1
Sample
efc04ade17b84a4bc1f48e548ca58e3c_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
efc04ade17b84a4bc1f48e548ca58e3c_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
alipay_msp.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
efc04ade17b84a4bc1f48e548ca58e3c_JaffaCakes118
-
Size
31.8MB
-
MD5
efc04ade17b84a4bc1f48e548ca58e3c
-
SHA1
aaee98274a1b62e345d12d383f5a82d795f3725f
-
SHA256
d2510f1e716c596dc74c9916f7054ed185fffea956b40faac0ba3ccb960f7afe
-
SHA512
729d256fa9dd76753009c5f066317a73dece23a905ad9bd184291de9faabd03a8fd541f4ec3b98709e8b3b6cc1994b54afd1029bb2eb5b8deeafcde141a5ceb2
-
SSDEEP
786432:Ui/yvZ3ERQTw9mYMDqf1UXDKeWPQye0x8muybkTP:Ui/yvZnw9mYgTKNP3qP
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
-
-
Target
alipay_msp.apk
-
Size
354KB
-
MD5
89c04e1ebcd58eca6dd93211628ed0bc
-
SHA1
7d1e77ce25a635299704dbd95bd95c697572ea9d
-
SHA256
ee3c608fff51b313f4e0b3e542bedccb4d4db4c8eb44e63bf4be0d468e9ee117
-
SHA512
3dccaeff9906401855f3071c91012926d7e9250674ea0bb89606e4862223a8343fc7b9369afe4e50031d261b45437107c018f565da5615c49721c3bf1bf6ed01
-
SSDEEP
6144:cH8LfOo+BjGVN8TdW4zxgnm1Us3JuOK2vf5C8EcPK+WvyQcQ2fnq7:cHLxBiVN8pWggmlY25CLE8RcQ2fnq7
Score7/10-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
1System Checks
1