General

  • Target

    a41b8f977592b36f9839177e7f923f66_JaffaCakes118

  • Size

    14.5MB

  • Sample

    240613-grttks1aql

  • MD5

    a41b8f977592b36f9839177e7f923f66

  • SHA1

    8e47e93c3f3627b58e63c9a3d88d265e62eb7d7c

  • SHA256

    3ef2a12a465615e35e64af0c90a694bb0f95f12ca9eb43169dfe3ea48da58451

  • SHA512

    192d00b2b084b8ce8b56492320f52f89a39e506069d915f998045d64b61846ca145f0e0d3abf006082c1a522cabc88c7c17d8a0a9d19abcd738c5cba8c39d82f

  • SSDEEP

    393216:2sS/Yl/X6GuPh+MzocTXMLmXwBYw0uHYPj0QaYWitIz1Oy:7kYdXRih+ATXNyYY20QRqp

Malware Config

Targets

    • Target

      a41b8f977592b36f9839177e7f923f66_JaffaCakes118

    • Size

      14.5MB

    • MD5

      a41b8f977592b36f9839177e7f923f66

    • SHA1

      8e47e93c3f3627b58e63c9a3d88d265e62eb7d7c

    • SHA256

      3ef2a12a465615e35e64af0c90a694bb0f95f12ca9eb43169dfe3ea48da58451

    • SHA512

      192d00b2b084b8ce8b56492320f52f89a39e506069d915f998045d64b61846ca145f0e0d3abf006082c1a522cabc88c7c17d8a0a9d19abcd738c5cba8c39d82f

    • SSDEEP

      393216:2sS/Yl/X6GuPh+MzocTXMLmXwBYw0uHYPj0QaYWitIz1Oy:7kYdXRih+ATXNyYY20QRqp

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks