General

  • Target

    83d5c4b2a023403d1f4708fff0533eaa_JaffaCakes118

  • Size

    13.6MB

  • Sample

    240530-l3bvcsdg2y

  • MD5

    83d5c4b2a023403d1f4708fff0533eaa

  • SHA1

    2f7aac1addf79d6e7f46e02ed1e20c707faa0950

  • SHA256

    0b952b02824c47701066187433878ebfed9f7cbb1e931115676618d9eb7d2bfa

  • SHA512

    33e0d113c4e61d00666b3dede4d47258247159a17eaee28d223f28647f66169fe39622c154dc60515f6fdaa7bec60bd8c548d0dd6608cd47aef1937cb962c674

  • SSDEEP

    393216:1jyNj0cGzvsZG80rGzho36eVQkSRF3isSF2x+Ig8abE:1jyynk5hoxsyTgcnbE

Malware Config

Targets

    • Target

      83d5c4b2a023403d1f4708fff0533eaa_JaffaCakes118

    • Size

      13.6MB

    • MD5

      83d5c4b2a023403d1f4708fff0533eaa

    • SHA1

      2f7aac1addf79d6e7f46e02ed1e20c707faa0950

    • SHA256

      0b952b02824c47701066187433878ebfed9f7cbb1e931115676618d9eb7d2bfa

    • SHA512

      33e0d113c4e61d00666b3dede4d47258247159a17eaee28d223f28647f66169fe39622c154dc60515f6fdaa7bec60bd8c548d0dd6608cd47aef1937cb962c674

    • SSDEEP

      393216:1jyNj0cGzvsZG80rGzho36eVQkSRF3isSF2x+Ig8abE:1jyynk5hoxsyTgcnbE

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks