General

  • Target

    9fde494c6c37348c45a6db871337bec3_JaffaCakes118

  • Size

    20.3MB

  • Sample

    240612-h3ttdstfqg

  • MD5

    9fde494c6c37348c45a6db871337bec3

  • SHA1

    bf689ca7fecf9c8bb310c319b7348eb4a784019d

  • SHA256

    caa61c5094acf2b80dd798100657cd243dcefa847df602fcd3ad224ed53867ac

  • SHA512

    0d816e6f60f0edabbb7bdd71f485dad6aab762a4784a42a15d475664dec0f5d74a6b0aef266ed2205ce4a6a299ec4238aaaf79282339b289e38d926e6af4d680

  • SSDEEP

    393216:25wPMAAe2Uj5wFdnwCyfQ7oh0tlXpAIFdRzf2zFCEE8TY9IJDluvZ/PICOafD:25wRD2USnwCjXpAIbRzDEmIJxq1PICOS

Malware Config

Targets

    • Target

      9fde494c6c37348c45a6db871337bec3_JaffaCakes118

    • Size

      20.3MB

    • MD5

      9fde494c6c37348c45a6db871337bec3

    • SHA1

      bf689ca7fecf9c8bb310c319b7348eb4a784019d

    • SHA256

      caa61c5094acf2b80dd798100657cd243dcefa847df602fcd3ad224ed53867ac

    • SHA512

      0d816e6f60f0edabbb7bdd71f485dad6aab762a4784a42a15d475664dec0f5d74a6b0aef266ed2205ce4a6a299ec4238aaaf79282339b289e38d926e6af4d680

    • SSDEEP

      393216:25wPMAAe2Uj5wFdnwCyfQ7oh0tlXpAIFdRzf2zFCEE8TY9IJDluvZ/PICOafD:25wRD2USnwCjXpAIbRzDEmIJxq1PICOS

    • Checks Android system properties for emulator presence.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Reads the content of photos stored on the user's device.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks