General
-
Target
9eb0b2754209ae7179a15244393ebf69_JaffaCakes118
-
Size
9.3MB
-
Sample
241126-ac7csszpfl
-
MD5
9eb0b2754209ae7179a15244393ebf69
-
SHA1
b2e7c05fac2a42ec3ded73c4c0d1808eb748a9db
-
SHA256
886fab267791342242a446080aa87671087631c6d8543e4b53d3094924e71c83
-
SHA512
ffb05adefb3878049c1f17529db15dd134bcc194f4a2b332dfc57d9d79c21d86b57c780ebf195f493c8b9382c6a858b6506b057b4189d6ca1e56e80b2e1b4195
-
SSDEEP
196608:NULXdHatsz/RCKf6H1/DZbf3jHDroKCk7wLRHRh6ot:NULdGMZ1SHlBPro28FHr66
Static task
static1
Behavioral task
behavioral1
Sample
9eb0b2754209ae7179a15244393ebf69_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
9eb0b2754209ae7179a15244393ebf69_JaffaCakes118.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
9eb0b2754209ae7179a15244393ebf69_JaffaCakes118
-
Size
9.3MB
-
MD5
9eb0b2754209ae7179a15244393ebf69
-
SHA1
b2e7c05fac2a42ec3ded73c4c0d1808eb748a9db
-
SHA256
886fab267791342242a446080aa87671087631c6d8543e4b53d3094924e71c83
-
SHA512
ffb05adefb3878049c1f17529db15dd134bcc194f4a2b332dfc57d9d79c21d86b57c780ebf195f493c8b9382c6a858b6506b057b4189d6ca1e56e80b2e1b4195
-
SSDEEP
196608:NULXdHatsz/RCKf6H1/DZbf3jHDroKCk7wLRHRh6ot:NULdGMZ1SHlBPro28FHr66
-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries the phone number (MSISDN for GSM devices)
-
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
3System Checks
3