General

  • Target

    72cc3f4cbcb638d388bddcde5f534f58_JaffaCakes118

  • Size

    4.4MB

  • Sample

    240525-wlzj7scf8v

  • MD5

    72cc3f4cbcb638d388bddcde5f534f58

  • SHA1

    6e2267ec91992ecd2bd8e905800d83445af5c106

  • SHA256

    b0635efa29083e1376cd5278ab616ff8925cff3b9b2aa4193c72799c55efd06c

  • SHA512

    afadf58c7b1c45140fad28de67a7da8c4a2d1456288fe247fbf8e42bddaaadcf898ee0a56974435972bb9c8953579c1605a1dc698c9cf20b2e073f10e603faac

  • SSDEEP

    98304:nbeouyxTeYj0TbNwJwRM3/Rui4OGnsxFSNLTXQwbF7E5uBLTN03buT8O58Y:nVeYjGSPRui47sxFSVgwbtOWPN0LuwOp

Malware Config

Targets

    • Target

      72cc3f4cbcb638d388bddcde5f534f58_JaffaCakes118

    • Size

      4.4MB

    • MD5

      72cc3f4cbcb638d388bddcde5f534f58

    • SHA1

      6e2267ec91992ecd2bd8e905800d83445af5c106

    • SHA256

      b0635efa29083e1376cd5278ab616ff8925cff3b9b2aa4193c72799c55efd06c

    • SHA512

      afadf58c7b1c45140fad28de67a7da8c4a2d1456288fe247fbf8e42bddaaadcf898ee0a56974435972bb9c8953579c1605a1dc698c9cf20b2e073f10e603faac

    • SSDEEP

      98304:nbeouyxTeYj0TbNwJwRM3/Rui4OGnsxFSNLTXQwbF7E5uBLTN03buT8O58Y:nVeYjGSPRui47sxFSVgwbtOWPN0LuwOp

    • Checks if the Android device is rooted.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Target

      gdtad.jar

    • Size

      69KB

    • MD5

      595b2a62c7377a811a24307102751b11

    • SHA1

      55814431108f7f847ea252bc4b21cf70a37280b6

    • SHA256

      e53cba6378e274af8716011e0ec56a2c1209c3aecd6f2aa2384f0034348ae4a7

    • SHA512

      31d168d07dc5b9da8a57db387e9a4a5b6bee6f26218cd80f078b8fde4cac947a7b122e78a1c43165b10afe8a0583abfc102f001bba6168691e4f7049f699eb2f

    • SSDEEP

      1536:lsxryGVNeJOwxZhAt0fBovXjEl0hISz2qr+0L/R+GGgrHTPZIRJ:pGLeJfxZhAt0q7ECF2yrzQ

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks