General

  • Target

    6c657c4ce9b1f1bf0b0aa50f341760b7_JaffaCakes118

  • Size

    6.9MB

  • Sample

    240523-1w7e1sad86

  • MD5

    6c657c4ce9b1f1bf0b0aa50f341760b7

  • SHA1

    53c9e67422c0c45eafb3006d05b214fcfa40bc04

  • SHA256

    6bedfcb53484a3f6213b3fd8d197803f00cd3f8ec86a5c26725d53cdb4d66442

  • SHA512

    b9d5cfc4d7b9fc1783c5146b54f4e49b27ccaec7d070310073783c10f1abf65fe5df939fae15c793b6ec25c5f91377625fa3d51ffabb56e03b3cea64b5b0585e

  • SSDEEP

    98304:+Lhhw245drCFhNrI7/5oOnS0JJCQGwRzhfHQ6yP3lNNJnlgGEG53SgjtwV38:+t2dINrI7RoOvbZf36VNNJlf3zaM

Malware Config

Targets

    • Target

      6c657c4ce9b1f1bf0b0aa50f341760b7_JaffaCakes118

    • Size

      6.9MB

    • MD5

      6c657c4ce9b1f1bf0b0aa50f341760b7

    • SHA1

      53c9e67422c0c45eafb3006d05b214fcfa40bc04

    • SHA256

      6bedfcb53484a3f6213b3fd8d197803f00cd3f8ec86a5c26725d53cdb4d66442

    • SHA512

      b9d5cfc4d7b9fc1783c5146b54f4e49b27ccaec7d070310073783c10f1abf65fe5df939fae15c793b6ec25c5f91377625fa3d51ffabb56e03b3cea64b5b0585e

    • SSDEEP

      98304:+Lhhw245drCFhNrI7/5oOnS0JJCQGwRzhfHQ6yP3lNNJnlgGEG53SgjtwV38:+t2dINrI7RoOvbZf36VNNJlf3zaM

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks