General
-
Target
6fe2b92defcb570de6b937014cabcc05_JaffaCakes118
-
Size
4.7MB
-
Sample
241023-t22cmasbmq
-
MD5
6fe2b92defcb570de6b937014cabcc05
-
SHA1
63912f76869f39f43af2b5fea2b6e9274e81c254
-
SHA256
c26bfe2baa1c5e585583e38ff3017709b6f677aa2be3b65bce0dbde2a6c7e65e
-
SHA512
3c337248084bf37cd7ce7b241fc504161935226794ba0b630136abdc16b38a5ee57de5659913633cc5f3a93c95b5404ea36621e763368ebabfdfd95c6de6c6db
-
SSDEEP
98304:3IIWB8QMpkdHxQfas+AY33FBINqp1pD5U0/s6hMa8D43rQC/jZPe/Dg2BCUnN5kK:YyJpgmfoB31i81r5VPMhkorkNg
Static task
static1
Behavioral task
behavioral1
Sample
6fe2b92defcb570de6b937014cabcc05_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
6fe2b92defcb570de6b937014cabcc05_JaffaCakes118
-
Size
4.7MB
-
MD5
6fe2b92defcb570de6b937014cabcc05
-
SHA1
63912f76869f39f43af2b5fea2b6e9274e81c254
-
SHA256
c26bfe2baa1c5e585583e38ff3017709b6f677aa2be3b65bce0dbde2a6c7e65e
-
SHA512
3c337248084bf37cd7ce7b241fc504161935226794ba0b630136abdc16b38a5ee57de5659913633cc5f3a93c95b5404ea36621e763368ebabfdfd95c6de6c6db
-
SSDEEP
98304:3IIWB8QMpkdHxQfas+AY33FBINqp1pD5U0/s6hMa8D43rQC/jZPe/Dg2BCUnN5kK:YyJpgmfoB31i81r5VPMhkorkNg
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-