General

  • Target

    a2c4d9ef093d556fc9c2b8f218f05a73_JaffaCakes118

  • Size

    14.3MB

  • Sample

    240612-2p6qkstdrf

  • MD5

    a2c4d9ef093d556fc9c2b8f218f05a73

  • SHA1

    dc5a2b124e3c5f18eb5c3b0c49e62fb4d07d560f

  • SHA256

    fab152d45cbf7647dfa9aa599b47968a5d63890e1e045c6a127693f191369192

  • SHA512

    9c5788f3b14b2587a7c8ad69a0454c3c400a1c459587821f7ec64d55d4f2d0ee600ffbaa222b729acf9651b0ed10f288c877a8635ec715552f506564a3362513

  • SSDEEP

    196608:hiHO7THDgx87DLFFoz9RL4LNuM/yXSqLh+4wleqcL4ysnfI0Pm1LCg/jGv:hZ7Tu87DhFoz9tWyThHRIPmcgLGv

Malware Config

Targets

    • Target

      a2c4d9ef093d556fc9c2b8f218f05a73_JaffaCakes118

    • Size

      14.3MB

    • MD5

      a2c4d9ef093d556fc9c2b8f218f05a73

    • SHA1

      dc5a2b124e3c5f18eb5c3b0c49e62fb4d07d560f

    • SHA256

      fab152d45cbf7647dfa9aa599b47968a5d63890e1e045c6a127693f191369192

    • SHA512

      9c5788f3b14b2587a7c8ad69a0454c3c400a1c459587821f7ec64d55d4f2d0ee600ffbaa222b729acf9651b0ed10f288c877a8635ec715552f506564a3362513

    • SSDEEP

      196608:hiHO7THDgx87DLFFoz9RL4LNuM/yXSqLh+4wleqcL4ysnfI0Pm1LCg/jGv:hZ7Tu87DhFoz9tWyThHRIPmcgLGv

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks