General

  • Target

    a3e574122b0146d9be60feab2c532c29_JaffaCakes118

  • Size

    31.1MB

  • Sample

    240613-fl7mtayekj

  • MD5

    a3e574122b0146d9be60feab2c532c29

  • SHA1

    e59dd8e8e99016384baa8e78c61bee82a3e11402

  • SHA256

    dbd3ed439189d9c51bbd915d2d4592b340595a4c307ce76121e4fcd756edff58

  • SHA512

    8ce0839c035b8fd0cfa7a8bb9e6df1c7d9ea06772c77431f3c66bab996f81e72c5aaa8f0b61034802825f118f013fdb300365bff0ced55d00d24d6b58f813a66

  • SSDEEP

    786432:/cvXFuGFWYb/FS+fiof6cEp6vz1A32rpNm+cVsWEke+wPE9CrvI7H3Ehh0cbx:0vXFuGFWkviDcEp6Lm3oNmVVTEADCSX4

Malware Config

Targets

    • Target

      a3e574122b0146d9be60feab2c532c29_JaffaCakes118

    • Size

      31.1MB

    • MD5

      a3e574122b0146d9be60feab2c532c29

    • SHA1

      e59dd8e8e99016384baa8e78c61bee82a3e11402

    • SHA256

      dbd3ed439189d9c51bbd915d2d4592b340595a4c307ce76121e4fcd756edff58

    • SHA512

      8ce0839c035b8fd0cfa7a8bb9e6df1c7d9ea06772c77431f3c66bab996f81e72c5aaa8f0b61034802825f118f013fdb300365bff0ced55d00d24d6b58f813a66

    • SSDEEP

      786432:/cvXFuGFWYb/FS+fiof6cEp6vz1A32rpNm+cVsWEke+wPE9CrvI7H3Ehh0cbx:0vXFuGFWkviDcEp6Lm3oNmVVTEADCSX4

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks