General

  • Target

    a347dcd97ad775a945e0aee4269e4eb8_JaffaCakes118

  • Size

    11.6MB

  • Sample

    240613-bd5q2asbjj

  • MD5

    a347dcd97ad775a945e0aee4269e4eb8

  • SHA1

    c7c5fadaca88f2f405750cdbaed555a26f457c3d

  • SHA256

    d9463605961f683342eca09e80846920679df602402711c0d56ea63284d396cc

  • SHA512

    792b9d7dc2c34432aa34d27f5853562905ef77154880ad4c7c4c577e3882d49534229026cfa8a47935d59fcb56904ffbcbc06406a7952f89eaa3b642ff55e004

  • SSDEEP

    196608:HbxgvIApK5qDMyKsnpaH4r2R9hxxwVoHq1YgvGHgsxo7Z/nTYX43xqFy1inPZlRJ:FaJpUKatr7wVoq1tGAb7MsxWwgRbwK

Malware Config

Targets

    • Target

      a347dcd97ad775a945e0aee4269e4eb8_JaffaCakes118

    • Size

      11.6MB

    • MD5

      a347dcd97ad775a945e0aee4269e4eb8

    • SHA1

      c7c5fadaca88f2f405750cdbaed555a26f457c3d

    • SHA256

      d9463605961f683342eca09e80846920679df602402711c0d56ea63284d396cc

    • SHA512

      792b9d7dc2c34432aa34d27f5853562905ef77154880ad4c7c4c577e3882d49534229026cfa8a47935d59fcb56904ffbcbc06406a7952f89eaa3b642ff55e004

    • SSDEEP

      196608:HbxgvIApK5qDMyKsnpaH4r2R9hxxwVoHq1YgvGHgsxo7Z/nTYX43xqFy1inPZlRJ:FaJpUKatr7wVoq1tGAb7MsxWwgRbwK

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Matrix

Tasks