General

  • Target

    986d98fe4634feb42992b1c03d1c88ca_JaffaCakes118

  • Size

    19.9MB

  • Sample

    240605-r3f2zahh7w

  • MD5

    986d98fe4634feb42992b1c03d1c88ca

  • SHA1

    03de0fb4957bed4f4d14a1f69d3974299c38ac78

  • SHA256

    108d676fce87a2ff5921497f3c49b0caa8c1b8994015d7096a2ed665a896e591

  • SHA512

    570f79b833eccaa69b5e8bc4f7aa4620a4f4877eab4077540205aae3280f2cd080992ff54fbc09882f617979642a52c0d4a56d0b334fb2b38fa8cfb227b6cc52

  • SSDEEP

    393216:MSyMCPDBa+wm1JcPP3Q+92o/H5nh/LQc7XIqyzAOX9MTwx0iVNb2II:MWKDDW192oTLxIZAOX9MTwHK

Malware Config

Targets

    • Target

      986d98fe4634feb42992b1c03d1c88ca_JaffaCakes118

    • Size

      19.9MB

    • MD5

      986d98fe4634feb42992b1c03d1c88ca

    • SHA1

      03de0fb4957bed4f4d14a1f69d3974299c38ac78

    • SHA256

      108d676fce87a2ff5921497f3c49b0caa8c1b8994015d7096a2ed665a896e591

    • SHA512

      570f79b833eccaa69b5e8bc4f7aa4620a4f4877eab4077540205aae3280f2cd080992ff54fbc09882f617979642a52c0d4a56d0b334fb2b38fa8cfb227b6cc52

    • SSDEEP

      393216:MSyMCPDBa+wm1JcPP3Q+92o/H5nh/LQc7XIqyzAOX9MTwx0iVNb2II:MWKDDW192oTLxIZAOX9MTwHK

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks