General

  • Target

    6cb8700b959e537cec3a31ed10cb424d_JaffaCakes118

  • Size

    4.1MB

  • Sample

    240524-abg2hsec35

  • MD5

    6cb8700b959e537cec3a31ed10cb424d

  • SHA1

    577416a6cd68439cb1ab233a586aa473551789d5

  • SHA256

    2b073ecb7bd5bb4b6ab64ca010b08694367a5a83deb210a133c0ba48901325c0

  • SHA512

    b54084ad0207c777942bbc41c7304a2e1dc69f5f62baa1da8fdbe86f5d6e2aa238e645fe8b5599f28ae08b16353867d2da1ff42e3fe90fea533018fdc6730585

  • SSDEEP

    98304:Kh+PY6PxT1v5EJbqq7GUzZfAnpR7aU4lqJRMn5fgrsh2D:AqY6PxThuJbTCKZf4pR7aFqPe5orshQ

Malware Config

Targets

    • Target

      6cb8700b959e537cec3a31ed10cb424d_JaffaCakes118

    • Size

      4.1MB

    • MD5

      6cb8700b959e537cec3a31ed10cb424d

    • SHA1

      577416a6cd68439cb1ab233a586aa473551789d5

    • SHA256

      2b073ecb7bd5bb4b6ab64ca010b08694367a5a83deb210a133c0ba48901325c0

    • SHA512

      b54084ad0207c777942bbc41c7304a2e1dc69f5f62baa1da8fdbe86f5d6e2aa238e645fe8b5599f28ae08b16353867d2da1ff42e3fe90fea533018fdc6730585

    • SSDEEP

      98304:Kh+PY6PxT1v5EJbqq7GUzZfAnpR7aU4lqJRMn5fgrsh2D:AqY6PxThuJbTCKZf4pR7aFqPe5orshQ

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks