General

  • Target

    a2b19489a05deff7727f78107dee2bbc_JaffaCakes118

  • Size

    9.9MB

  • Sample

    240612-2desqawhnl

  • MD5

    a2b19489a05deff7727f78107dee2bbc

  • SHA1

    04f85843611934bd7f243c9b6cd6f72ff59b64a4

  • SHA256

    f5cfc7c8d302e0b4d27f99def61bc0a6887ce8bcd031cad2058b0ad210cf1e10

  • SHA512

    bb66e601f911031d564a01a56b1af9acb267aa635d0e2519e97b68725867a829caeff75d06563537e2e72e737938750341c579eae683be3fd5fbe416e81a2f31

  • SSDEEP

    196608:K/X4vk0tl3IAtMFqTFHR5seMlTID0ERnhIYYmLQHq:K/X4vk0tlY4Zz5acDjRnhhYmLaq

Malware Config

Targets

    • Target

      a2b19489a05deff7727f78107dee2bbc_JaffaCakes118

    • Size

      9.9MB

    • MD5

      a2b19489a05deff7727f78107dee2bbc

    • SHA1

      04f85843611934bd7f243c9b6cd6f72ff59b64a4

    • SHA256

      f5cfc7c8d302e0b4d27f99def61bc0a6887ce8bcd031cad2058b0ad210cf1e10

    • SHA512

      bb66e601f911031d564a01a56b1af9acb267aa635d0e2519e97b68725867a829caeff75d06563537e2e72e737938750341c579eae683be3fd5fbe416e81a2f31

    • SSDEEP

      196608:K/X4vk0tl3IAtMFqTFHR5seMlTID0ERnhIYYmLQHq:K/X4vk0tlY4Zz5acDjRnhhYmLaq

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks