General
-
Target
9e8aa2476bcdc551a33326f57f15b185_JaffaCakes118
-
Size
14.4MB
-
Sample
241125-3h9z4aypcn
-
MD5
9e8aa2476bcdc551a33326f57f15b185
-
SHA1
27564a325ffe51f45928d958572bb00c20e2486b
-
SHA256
451a50c3f405e1c3f3a71c8c04f705a30c44737d22cc6fe374c9bdb8f7b4c5f7
-
SHA512
d8567465e1325af5aac56c4fa383d67ff104af16b39c089b777426571d46573442204466474b910ed9b38d1166a6d808126b6131f4250dc3890b8bf63c13953c
-
SSDEEP
393216:1UuNEt4HEep5BViqsS5vLwuUT0pvWPRtqOJePLkhIG:+uQinpjgqvvLPr1WzNJejkhT
Behavioral task
behavioral1
Sample
9e8aa2476bcdc551a33326f57f15b185_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
9e8aa2476bcdc551a33326f57f15b185_JaffaCakes118.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
9e8aa2476bcdc551a33326f57f15b185_JaffaCakes118
-
Size
14.4MB
-
MD5
9e8aa2476bcdc551a33326f57f15b185
-
SHA1
27564a325ffe51f45928d958572bb00c20e2486b
-
SHA256
451a50c3f405e1c3f3a71c8c04f705a30c44737d22cc6fe374c9bdb8f7b4c5f7
-
SHA512
d8567465e1325af5aac56c4fa383d67ff104af16b39c089b777426571d46573442204466474b910ed9b38d1166a6d808126b6131f4250dc3890b8bf63c13953c
-
SSDEEP
393216:1UuNEt4HEep5BViqsS5vLwuUT0pvWPRtqOJePLkhIG:+uQinpjgqvvLPr1WzNJejkhT
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-
Requests accessing notifications (often used to intercept notifications before users become aware).
-
Tries to add a device administrator.
-
Checks the presence of a debugger
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Privilege Escalation
Abuse Elevation Control Mechanism
1Device Administrator Permissions
1Defense Evasion
Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Virtualization/Sandbox Evasion
1System Checks
1