General

  • Target

    a37b4ad34f51957f3ecd532ab535e3ea_JaffaCakes118

  • Size

    6.7MB

  • Sample

    240613-chldma1ajf

  • MD5

    a37b4ad34f51957f3ecd532ab535e3ea

  • SHA1

    25dd7bfa664931081aaff4739ca79d696e45f3db

  • SHA256

    3d9db4de30932cb36bbc631f70ed516d93c90e51d481bd48b94bdfb83f8a66ec

  • SHA512

    86df591c7dd60706fd639bfcade0b9d68358c3065b8f84151e17c53d2ec5aba7b22a50be5a7b0b04dc99758baed8c3cc5cdb831d642e8763d289610e07da780d

  • SSDEEP

    196608:qjoH3ZX4Qs01H8mGaNUXKSWjiFDNaFkR75N3VAvl/l1tm1Sqi:qj8ZIQtNUXKroDWk7NlAvNl1tmM

Malware Config

Targets

    • Target

      a37b4ad34f51957f3ecd532ab535e3ea_JaffaCakes118

    • Size

      6.7MB

    • MD5

      a37b4ad34f51957f3ecd532ab535e3ea

    • SHA1

      25dd7bfa664931081aaff4739ca79d696e45f3db

    • SHA256

      3d9db4de30932cb36bbc631f70ed516d93c90e51d481bd48b94bdfb83f8a66ec

    • SHA512

      86df591c7dd60706fd639bfcade0b9d68358c3065b8f84151e17c53d2ec5aba7b22a50be5a7b0b04dc99758baed8c3cc5cdb831d642e8763d289610e07da780d

    • SSDEEP

      196608:qjoH3ZX4Qs01H8mGaNUXKSWjiFDNaFkR75N3VAvl/l1tm1Sqi:qj8ZIQtNUXKroDWk7NlAvNl1tmM

    • Checks if the Android device is rooted.

    • Checks Android system properties for emulator presence.

    • Checks Qemu related system properties.

      Checks for Android system properties related to Qemu for Emulator detection.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Reads the content of the SMS messages.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests changing the default SMS application.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks