General

  • Target

    a1518f6dafb754ebdeaf5c6981e61d29_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240612-twza3s1fnb

  • MD5

    a1518f6dafb754ebdeaf5c6981e61d29

  • SHA1

    ab4626ef21985490fcf640d0df5b101ae1e1584b

  • SHA256

    5fd92591686e26c40015c3227f43e3405181fd9eddff6fa10588715510898719

  • SHA512

    8f888b90fca2eb194b93b3900ece56e9cd2691b6a4e6baa898aeba3113419cca785c7d17e9f4bd5ac4bd57932a8cb206dafe0f5eea0478ccc45cbf46ae20054e

  • SSDEEP

    24576:eH1frO97Ds8hi3UdyT977CGMzEiV7KbkTHkem44GhFO3JOGcKVLxSasCZm54YsW:M1fo39/dyTV7CGaZ2Nepi3EKV9YfsW

Malware Config

Targets

    • Target

      a1518f6dafb754ebdeaf5c6981e61d29_JaffaCakes118

    • Size

      1.2MB

    • MD5

      a1518f6dafb754ebdeaf5c6981e61d29

    • SHA1

      ab4626ef21985490fcf640d0df5b101ae1e1584b

    • SHA256

      5fd92591686e26c40015c3227f43e3405181fd9eddff6fa10588715510898719

    • SHA512

      8f888b90fca2eb194b93b3900ece56e9cd2691b6a4e6baa898aeba3113419cca785c7d17e9f4bd5ac4bd57932a8cb206dafe0f5eea0478ccc45cbf46ae20054e

    • SSDEEP

      24576:eH1frO97Ds8hi3UdyT977CGMzEiV7KbkTHkem44GhFO3JOGcKVLxSasCZm54YsW:M1fo39/dyTV7CGaZ2Nepi3EKV9YfsW

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks