General

  • Target

    a82a05489d6d4a5305ba7b763853c2fa_JaffaCakes118

  • Size

    10.6MB

  • Sample

    240614-f8alla1anm

  • MD5

    a82a05489d6d4a5305ba7b763853c2fa

  • SHA1

    2764d4065c3b34b6b402434f1a8a5f1889db171a

  • SHA256

    586b83196e48c3399e03264447acacb2d39d2cfbae6541df48a9a325e8480fcc

  • SHA512

    ff7a72fecee0b69e53c1b830700c68cb67f57e5afa3125ddc5a18d7c14c0bd5bd705ebf64891be874f8ccf842660ee72f19cecc26ace02e0ab3f3865d134fe28

  • SSDEEP

    196608:pGRzel+BgXI/H5qgH5AM3/X78oa/5uS5MM+rvSTh9m:ARvRZ5t3/Xs/kS+++

Malware Config

Targets

    • Target

      a82a05489d6d4a5305ba7b763853c2fa_JaffaCakes118

    • Size

      10.6MB

    • MD5

      a82a05489d6d4a5305ba7b763853c2fa

    • SHA1

      2764d4065c3b34b6b402434f1a8a5f1889db171a

    • SHA256

      586b83196e48c3399e03264447acacb2d39d2cfbae6541df48a9a325e8480fcc

    • SHA512

      ff7a72fecee0b69e53c1b830700c68cb67f57e5afa3125ddc5a18d7c14c0bd5bd705ebf64891be874f8ccf842660ee72f19cecc26ace02e0ab3f3865d134fe28

    • SSDEEP

      196608:pGRzel+BgXI/H5qgH5AM3/X78oa/5uS5MM+rvSTh9m:ARvRZ5t3/Xs/kS+++

    • Checks if the Android device is rooted.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks