General

  • Target

    935ab14e332e00900733b08f2e738300_JaffaCakes118

  • Size

    5.9MB

  • Sample

    240604-ch2qlshf6z

  • MD5

    935ab14e332e00900733b08f2e738300

  • SHA1

    41843b6de8e5524b5cf113f60e67777cbd11f18c

  • SHA256

    2832995f968e658c7c14d45224acaa0bdb395a5bddda29383dcda50109b5ce96

  • SHA512

    1b503e6060ed68d3404a55b988e7342c174a5f73689260bad2ca75e41385b2f64c2f1e8aa0cd072d09289226749579bf9e4ea144b29f473b816cfe2f0cfcfd49

  • SSDEEP

    98304:+1P0t5vouyHwy3KEYfaVSwrxL0y1gxmDOJuac4Z+W86uuo9G6B7oUspgPlfd8osp:vt1otRYi5LBgxs7ZM+W8X9G6odpg4ENw

Malware Config

Targets

    • Target

      935ab14e332e00900733b08f2e738300_JaffaCakes118

    • Size

      5.9MB

    • MD5

      935ab14e332e00900733b08f2e738300

    • SHA1

      41843b6de8e5524b5cf113f60e67777cbd11f18c

    • SHA256

      2832995f968e658c7c14d45224acaa0bdb395a5bddda29383dcda50109b5ce96

    • SHA512

      1b503e6060ed68d3404a55b988e7342c174a5f73689260bad2ca75e41385b2f64c2f1e8aa0cd072d09289226749579bf9e4ea144b29f473b816cfe2f0cfcfd49

    • SSDEEP

      98304:+1P0t5vouyHwy3KEYfaVSwrxL0y1gxmDOJuac4Z+W86uuo9G6B7oUspgPlfd8osp:vt1otRYi5LBgxs7ZM+W8X9G6odpg4ENw

    Score
    8/10
    • Checks if the Android device is rooted.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Checks if the internet connection is available

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

MITRE ATT&CK Mobile v15

Tasks