General
-
Target
6fea03808135b350d894cc517c896244_JaffaCakes118
-
Size
9.1MB
-
Sample
241023-vcdqpszhnb
-
MD5
6fea03808135b350d894cc517c896244
-
SHA1
41c613f89cdd9900c87dcfbdba2ec4a415d4e623
-
SHA256
2eca002d3f7aacb6f676005a90881d30ae64793bd9161e99d72fecdc02ce0a16
-
SHA512
6cf0060b4b7212d1b1922febbb80ac6e103d3bd7a74265f75b3cb96777976e060f9964e69cb904a6c97d891e5326b7bc4355fbbfc69636ad9031cf3e02be1e7b
-
SSDEEP
196608:wmCJTiIwfKK/hBRF8HzuSYYNkLJFlYVoEYru+2vUqhJtCkbiE4UDATk6e:wrdiIwfKjzumkFrThq+2vUqhJhbLkTq
Static task
static1
Behavioral task
behavioral1
Sample
6fea03808135b350d894cc517c896244_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
6fea03808135b350d894cc517c896244_JaffaCakes118
-
Size
9.1MB
-
MD5
6fea03808135b350d894cc517c896244
-
SHA1
41c613f89cdd9900c87dcfbdba2ec4a415d4e623
-
SHA256
2eca002d3f7aacb6f676005a90881d30ae64793bd9161e99d72fecdc02ce0a16
-
SHA512
6cf0060b4b7212d1b1922febbb80ac6e103d3bd7a74265f75b3cb96777976e060f9964e69cb904a6c97d891e5326b7bc4355fbbfc69636ad9031cf3e02be1e7b
-
SSDEEP
196608:wmCJTiIwfKK/hBRF8HzuSYYNkLJFlYVoEYru+2vUqhJtCkbiE4UDATk6e:wrdiIwfKjzumkFrThq+2vUqhJhbLkTq
-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
3System Checks
3