General

  • Target

    aa269560c185cfa5eea57b72a6c7287b_JaffaCakes118

  • Size

    875KB

  • Sample

    240614-rn7w5sthje

  • MD5

    aa269560c185cfa5eea57b72a6c7287b

  • SHA1

    4e55e7086912d0a2964d91211a166517a1e679ae

  • SHA256

    2ad5a5c4ae65265b4eee6c5f2b9c0d8ee5a33eac560462d25597d25ecfb57c52

  • SHA512

    e61450d891c2f224104b3e4a013918116dbd87dffd86a8417e0f6b62b03319082def4ab5aa62c9937ed14d60b21a1a3064d4cada9bfd1c2edbce8440296e1be1

  • SSDEEP

    12288:za32f5LGilndajBczhYQM6J3o5HPhhYmRmcu8zB1jOY+OXS93cCn6Wn:OULGiFdajBwh5MK3o5ZRmM9/+3bL

Malware Config

Targets

    • Target

      aa269560c185cfa5eea57b72a6c7287b_JaffaCakes118

    • Size

      875KB

    • MD5

      aa269560c185cfa5eea57b72a6c7287b

    • SHA1

      4e55e7086912d0a2964d91211a166517a1e679ae

    • SHA256

      2ad5a5c4ae65265b4eee6c5f2b9c0d8ee5a33eac560462d25597d25ecfb57c52

    • SHA512

      e61450d891c2f224104b3e4a013918116dbd87dffd86a8417e0f6b62b03319082def4ab5aa62c9937ed14d60b21a1a3064d4cada9bfd1c2edbce8440296e1be1

    • SSDEEP

      12288:za32f5LGilndajBczhYQM6J3o5HPhhYmRmcu8zB1jOY+OXS93cCn6Wn:OULGiFdajBwh5MK3o5ZRmM9/+3bL

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks