General

  • Target

    939fc9ed2ee5b0c23bbfbb036c37a38d_JaffaCakes118

  • Size

    28.4MB

  • Sample

    240604-e476madg59

  • MD5

    939fc9ed2ee5b0c23bbfbb036c37a38d

  • SHA1

    71f0fd587ea173790258c39de1fe979928d9e443

  • SHA256

    e254bc298968fc362fe0af3598f7ef436dcb51354752759b2138648920f19384

  • SHA512

    b0ce891731c95515115a7cdea7e6030bf701ee06bfb9c2638317483071511821be4f1ec189b3eecb5af541923a2c9e37b918648611a46d9abc8cb0433fd29b6e

  • SSDEEP

    786432:ZEuIvtNSJTop9niI5YBmSfv3ujbUZlpDl+CS2:ZEuIvtNSJToziIKmWv3GqpZ+Q

Malware Config

Targets

    • Target

      939fc9ed2ee5b0c23bbfbb036c37a38d_JaffaCakes118

    • Size

      28.4MB

    • MD5

      939fc9ed2ee5b0c23bbfbb036c37a38d

    • SHA1

      71f0fd587ea173790258c39de1fe979928d9e443

    • SHA256

      e254bc298968fc362fe0af3598f7ef436dcb51354752759b2138648920f19384

    • SHA512

      b0ce891731c95515115a7cdea7e6030bf701ee06bfb9c2638317483071511821be4f1ec189b3eecb5af541923a2c9e37b918648611a46d9abc8cb0433fd29b6e

    • SSDEEP

      786432:ZEuIvtNSJTop9niI5YBmSfv3ujbUZlpDl+CS2:ZEuIvtNSJToziIKmWv3GqpZ+Q

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Target

      ad_adview.jar

    • Size

      185KB

    • MD5

      bab52db9268f2e8d2a099c3a6d694fc2

    • SHA1

      f69fc2e8e24d2619e550e7841d84823c4bd49524

    • SHA256

      b29c1434b1aab68dd3e9b7cc708d55f70989e111700b395fada0a680cd40c5e4

    • SHA512

      bde4a2d1ef11819df1477a83e3956d91f523f19e828f08230f8d1f81227675d870e1c67bbacd3d2f247c348ef9df189e9847150eb242c4dd46d9db931a76b1e8

    • SSDEEP

      3072:4uH7lKjGMbLqLv1tM5Ifq4HuD38h1tGsfCoZo6aCdbSSDCKTf7FWNa70TKoumjiw:vGG6y/M5YW32/GsfCf6Nd1DTYNa7eKoF

    Score
    1/10
    • Target

      gdtadv2.jar

    • Size

      230KB

    • MD5

      33aeb27eefc5ae7838f01186e27d8816

    • SHA1

      2a7ef64266577916f05cc841c9f977ca8a34568f

    • SHA256

      c6a8f2838c910a50b56bddad227ebed00b8b32a6869a432c83964b1150ad2c59

    • SHA512

      ebd8ccc5750aa1c2a28e849149d0ef3d1c997479008a803a931ea10c82bd99d90797a99329690cbea6cbc18d45bbe481a5576abfe3ca8afc96dbb3974a0e00c5

    • SSDEEP

      6144:B8Obhi9RAdTKqZVGee8QXMLzKb/n4BQk+m:BbhiTAEQeVsWrn4BUm

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks