General

  • Target

    6c675d8a1b628bc6e4dcc98694f701ef_JaffaCakes118

  • Size

    31.2MB

  • Sample

    240523-1ymtdsaf3t

  • MD5

    6c675d8a1b628bc6e4dcc98694f701ef

  • SHA1

    7085994888a0966e146b083b7ef64ae1aa308e7a

  • SHA256

    b362a02586cf5596eb1b6baa3037ad366d71b02240d966921b45c9a36965ad0a

  • SHA512

    78b9c398eda5e27cd4aee50cc5f66b028c4edbafad5ab363b81c9be732d73b484ea5533967b61ded9a901e807736a938c568872a684e31bea7067ac8b43da0b2

  • SSDEEP

    786432:8EwRYy84Bg/YfUwtJ3bMnIN303iBz0CsAW5Ha/UZd/fPn:P4BgwfUwD3IokS9Kx56/UZdnP

Malware Config

Targets

    • Target

      6c675d8a1b628bc6e4dcc98694f701ef_JaffaCakes118

    • Size

      31.2MB

    • MD5

      6c675d8a1b628bc6e4dcc98694f701ef

    • SHA1

      7085994888a0966e146b083b7ef64ae1aa308e7a

    • SHA256

      b362a02586cf5596eb1b6baa3037ad366d71b02240d966921b45c9a36965ad0a

    • SHA512

      78b9c398eda5e27cd4aee50cc5f66b028c4edbafad5ab363b81c9be732d73b484ea5533967b61ded9a901e807736a938c568872a684e31bea7067ac8b43da0b2

    • SSDEEP

      786432:8EwRYy84Bg/YfUwtJ3bMnIN303iBz0CsAW5Ha/UZd/fPn:P4BgwfUwD3IokS9Kx56/UZdnP

    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

    • Target

      plugin-deploy.jar

    • Size

      213KB

    • MD5

      e70723b8f6c4c7c09a6019733022cf53

    • SHA1

      e3ca32166c65e4dc73c21347ab22d54a7b5a9a83

    • SHA256

      32d35cd80b0302e3fcdd7349b4ff9a7b689ce080435109607ff79a834ff710d5

    • SHA512

      461c0499193c5ef5aa4e2e5d358031e7d28c98c8e1e38d22b710271bf3b561c28232bfaadbc2c275357e31b7b0ad6bca798008328ac3cff3701c1c9cca2ddddd

    • SSDEEP

      6144:zIojh8YSG6e3Q7RZddAOKofd3yugpauc79lPcJJ6:Uoj2Ytg7RXdJfRyuVuCoJo

    Score
    1/10

MITRE ATT&CK Matrix

Tasks