General

  • Target

    9fded88674f27bfaa2ae9e3340a2c016_JaffaCakes118

  • Size

    6.9MB

  • Sample

    240612-h4nc1atgja

  • MD5

    9fded88674f27bfaa2ae9e3340a2c016

  • SHA1

    2af3fb3fda9915da149fe3053497a1ad9e8d2ba4

  • SHA256

    dd2d7b9f1b74fc9059859bf827159ba001db7997476bf529240e966151d1672d

  • SHA512

    5db43f6c6f5702adb98be016612ee5894a6d801b126679b8a5ef82992a2546ddfd032bd54513bc40dd1418c92a80f1c2bf93532b27f7da33f435ca24794bf1c8

  • SSDEEP

    98304:AEB5g/OU55wRSG45UhPp3Eoa/Jo3lTOL0wtBLHZlw8Y6FhY6F5hhL3YGehkcFpxo:R5xRX4GPpbaGVTC3wIXBh/eZFpxo

Malware Config

Targets

    • Target

      9fded88674f27bfaa2ae9e3340a2c016_JaffaCakes118

    • Size

      6.9MB

    • MD5

      9fded88674f27bfaa2ae9e3340a2c016

    • SHA1

      2af3fb3fda9915da149fe3053497a1ad9e8d2ba4

    • SHA256

      dd2d7b9f1b74fc9059859bf827159ba001db7997476bf529240e966151d1672d

    • SHA512

      5db43f6c6f5702adb98be016612ee5894a6d801b126679b8a5ef82992a2546ddfd032bd54513bc40dd1418c92a80f1c2bf93532b27f7da33f435ca24794bf1c8

    • SSDEEP

      98304:AEB5g/OU55wRSG45UhPp3Eoa/Jo3lTOL0wtBLHZlw8Y6FhY6F5hhL3YGehkcFpxo:R5xRX4GPpbaGVTC3wIXBh/eZFpxo

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

    • Target

      dynamic170.jar

    • Size

      74KB

    • MD5

      523b2e029686c51eab2d03836155d75b

    • SHA1

      274070846d86337efb4fa5bc70fd6197af67e5e2

    • SHA256

      aa2796a6f60296cb568bddb01b8193f7d3325374e05069c7dec0b9c6b3281f4e

    • SHA512

      9750d21c06ea7558fc0013dbe542c155495cc43c905731245d9c4a7aa7eb469da59b59f8088e8f2d42e1c08ccf7f8edb3b7b53dd54d4f173c40aa840899ca919

    • SSDEEP

      1536:YrGr4I97PqQ9MKdXgBVwrq5zYjUqZsoe9XSj6lQ:YKMUpdQp527djSQ

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks