General
-
Target
499d227e53e2e0df1dc808d2529507ac_JaffaCakes118
-
Size
342KB
-
Sample
241015-x7m9qssfmd
-
MD5
499d227e53e2e0df1dc808d2529507ac
-
SHA1
eeedbf4c50f68467e6ffd701a425b9ec8fd53a0e
-
SHA256
0b08c1a914dd791f3e6ef369c1103b3b8e6c310d17f36a667189811d8a14f11d
-
SHA512
864a01a2c164e33e97cfb36fd551a1dca274286ecf3242a2fc844b8ab2ce9f0cafb52f6e32a3193294c10d2be66d596032d6fecad307755a4123c4e8ee403693
-
SSDEEP
6144:2Tplw2P+sb/S8sN/Jlf+xHssYRXBlvNqUH/wD34KSvo3oEkZvBdkqj5:2te38Elf4HARX8UOIFvHLkQ
Static task
static1
Behavioral task
behavioral1
Sample
499d227e53e2e0df1dc808d2529507ac_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
499d227e53e2e0df1dc808d2529507ac_JaffaCakes118.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
499d227e53e2e0df1dc808d2529507ac_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
499d227e53e2e0df1dc808d2529507ac_JaffaCakes118
-
Size
342KB
-
MD5
499d227e53e2e0df1dc808d2529507ac
-
SHA1
eeedbf4c50f68467e6ffd701a425b9ec8fd53a0e
-
SHA256
0b08c1a914dd791f3e6ef369c1103b3b8e6c310d17f36a667189811d8a14f11d
-
SHA512
864a01a2c164e33e97cfb36fd551a1dca274286ecf3242a2fc844b8ab2ce9f0cafb52f6e32a3193294c10d2be66d596032d6fecad307755a4123c4e8ee403693
-
SSDEEP
6144:2Tplw2P+sb/S8sN/Jlf+xHssYRXBlvNqUH/wD34KSvo3oEkZvBdkqj5:2te38Elf4HARX8UOIFvHLkQ
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-