General
-
Target
528f837d06eeed41f47ad96a4764a574_JaffaCakes118
-
Size
17.3MB
-
Sample
241017-tmalcsxbpl
-
MD5
528f837d06eeed41f47ad96a4764a574
-
SHA1
9ba9372885dc1c3fb44da3d2cfe2cc86079bb4fd
-
SHA256
812a154d46d5fc703bc0b56eae32c2403038fa4c4e0086b3c85f1c8922f895ec
-
SHA512
b6be4ce593473181dac781d7ef87db567c9b6e4b8583c4c13807307927b554a24f19fc1fb00580931b43705efc296cae80be16fac95d4ad259eef7d195b5c6b3
-
SSDEEP
393216:QoTnf9Up7mFTyhmJt0pvtLuwpATWOve2bop1CLf:QoD7TyhkAvtjEy2qif
Static task
static1
Behavioral task
behavioral1
Sample
528f837d06eeed41f47ad96a4764a574_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
528f837d06eeed41f47ad96a4764a574_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
528f837d06eeed41f47ad96a4764a574_JaffaCakes118
-
Size
17.3MB
-
MD5
528f837d06eeed41f47ad96a4764a574
-
SHA1
9ba9372885dc1c3fb44da3d2cfe2cc86079bb4fd
-
SHA256
812a154d46d5fc703bc0b56eae32c2403038fa4c4e0086b3c85f1c8922f895ec
-
SHA512
b6be4ce593473181dac781d7ef87db567c9b6e4b8583c4c13807307927b554a24f19fc1fb00580931b43705efc296cae80be16fac95d4ad259eef7d195b5c6b3
-
SSDEEP
393216:QoTnf9Up7mFTyhmJt0pvtLuwpATWOve2bop1CLf:QoD7TyhkAvtjEy2qif
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1