General
-
Target
848c91e4e3f19335901a0bc08b7b10c6_JaffaCakes118
-
Size
30.2MB
-
Sample
241101-wdpd9svmdj
-
MD5
848c91e4e3f19335901a0bc08b7b10c6
-
SHA1
1fabe943ba35aec9c0b727d04b70119d334ba33a
-
SHA256
e0249536c87734ee38126bde23ce82327bfae9b4754536411ea3d6ba58f6d00c
-
SHA512
07c8f41aeb4478506b37dbe2219338cba0bb46402a5ab48f67d4a7f3f8f3bde2a09a5a22bd56adc75727312e03967a9be6cdb89c27b08d7aa503c6d22307a32f
-
SSDEEP
786432:xq8Y/KeM7SJDOmDaWojmDaWwJplWZxaEwTG50NnIAw/sP1YHCpC:c/muW3f5DXEwTK0NnIb0NoV
Static task
static1
Behavioral task
behavioral1
Sample
848c91e4e3f19335901a0bc08b7b10c6_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
848c91e4e3f19335901a0bc08b7b10c6_JaffaCakes118
-
Size
30.2MB
-
MD5
848c91e4e3f19335901a0bc08b7b10c6
-
SHA1
1fabe943ba35aec9c0b727d04b70119d334ba33a
-
SHA256
e0249536c87734ee38126bde23ce82327bfae9b4754536411ea3d6ba58f6d00c
-
SHA512
07c8f41aeb4478506b37dbe2219338cba0bb46402a5ab48f67d4a7f3f8f3bde2a09a5a22bd56adc75727312e03967a9be6cdb89c27b08d7aa503c6d22307a32f
-
SSDEEP
786432:xq8Y/KeM7SJDOmDaWojmDaWwJplWZxaEwTG50NnIAw/sP1YHCpC:c/muW3f5DXEwTK0NnIb0NoV
Score7/10-
Checks Android system properties for emulator presence.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-