General

  • Target

    9055cbcb05fd183ca810678127a100a1_JaffaCakes118

  • Size

    31.8MB

  • Sample

    240603-djlw8aac79

  • MD5

    9055cbcb05fd183ca810678127a100a1

  • SHA1

    646dbd6e7cba8bd596b3b20d1b684ca3d01a6289

  • SHA256

    1266c501b524601728de61f511d0887ab210188de4aed5cdb9c2bcec765b7c1a

  • SHA512

    22debfea91a5892b4923f2daf85db0a8990203f58a1ec1c83654eb78e44966a54474387a12e34c594064f624f3b667ac3fbd79cca972603c5a1721fbcbe77138

  • SSDEEP

    786432:h5jd6jrEIFFDwMRaGEoGU2RZK58Rc5BNhBsv0eJ6ksttAM80Zc0f9:vkjYMBTREoF2RZQ1BGJDEJ80Zc0F

Malware Config

Targets

    • Target

      9055cbcb05fd183ca810678127a100a1_JaffaCakes118

    • Size

      31.8MB

    • MD5

      9055cbcb05fd183ca810678127a100a1

    • SHA1

      646dbd6e7cba8bd596b3b20d1b684ca3d01a6289

    • SHA256

      1266c501b524601728de61f511d0887ab210188de4aed5cdb9c2bcec765b7c1a

    • SHA512

      22debfea91a5892b4923f2daf85db0a8990203f58a1ec1c83654eb78e44966a54474387a12e34c594064f624f3b667ac3fbd79cca972603c5a1721fbcbe77138

    • SSDEEP

      786432:h5jd6jrEIFFDwMRaGEoGU2RZK58Rc5BNhBsv0eJ6ksttAM80Zc0f9:vkjYMBTREoF2RZQ1BGJDEJ80Zc0F

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

MITRE ATT&CK Mobile v15

Tasks