General

  • Target

    6f6b469d2664a0172fb451b32f66c048_JaffaCakes118

  • Size

    30.5MB

  • Sample

    240524-wycafaee3y

  • MD5

    6f6b469d2664a0172fb451b32f66c048

  • SHA1

    e4d12e2ff32934f09211edeeb80d324aefe51c81

  • SHA256

    16016c229e1a2a714422d73babdf93169efa8383975312bb2846198f7ac45b17

  • SHA512

    ac7e1e4404c38d7148b52f78d48cb5556055c3d17243d0a8d2dbbbc1f89e9a9aa1e3c197aebaa88cbe1723e5135c710968078b4c0026fa87e3d19a5a7db9c076

  • SSDEEP

    786432:ogyqsNjLKD88Yroh6Ugb0jRGogWP1fh82SmW2Uc:og+vKD8DohzwoxD81mJ

Malware Config

Targets

    • Target

      6f6b469d2664a0172fb451b32f66c048_JaffaCakes118

    • Size

      30.5MB

    • MD5

      6f6b469d2664a0172fb451b32f66c048

    • SHA1

      e4d12e2ff32934f09211edeeb80d324aefe51c81

    • SHA256

      16016c229e1a2a714422d73babdf93169efa8383975312bb2846198f7ac45b17

    • SHA512

      ac7e1e4404c38d7148b52f78d48cb5556055c3d17243d0a8d2dbbbc1f89e9a9aa1e3c197aebaa88cbe1723e5135c710968078b4c0026fa87e3d19a5a7db9c076

    • SSDEEP

      786432:ogyqsNjLKD88Yroh6Ugb0jRGogWP1fh82SmW2Uc:og+vKD8DohzwoxD81mJ

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks