General

  • Target

    aaf36256a481be164522d7d06baa6d12_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240614-v778sstfrj

  • MD5

    aaf36256a481be164522d7d06baa6d12

  • SHA1

    de9340f632db661eb79573985dffe4c825fe4ee4

  • SHA256

    850a4d202c53c604b3f525f2197c9aafab067924528920a9235df9546114b91e

  • SHA512

    2631efb91af6200cf341bd7f0b2ff5388a1f9ecdee3b0ad78ace6a161567d5d9cb7661934b0351a41c9fd316cbe9a54abe699e746134900f3651a7a063a20adf

  • SSDEEP

    49152:t+hLbCobOVt7r5/W7GHWto+k7i9B5YEGu5+cP47E5WmIzhZ2oaBCTe:sbvbOv5/WiHMk7iz5YEz+cQ45WmI9ZJo

Malware Config

Targets

    • Target

      aaf36256a481be164522d7d06baa6d12_JaffaCakes118

    • Size

      2.6MB

    • MD5

      aaf36256a481be164522d7d06baa6d12

    • SHA1

      de9340f632db661eb79573985dffe4c825fe4ee4

    • SHA256

      850a4d202c53c604b3f525f2197c9aafab067924528920a9235df9546114b91e

    • SHA512

      2631efb91af6200cf341bd7f0b2ff5388a1f9ecdee3b0ad78ace6a161567d5d9cb7661934b0351a41c9fd316cbe9a54abe699e746134900f3651a7a063a20adf

    • SSDEEP

      49152:t+hLbCobOVt7r5/W7GHWto+k7i9B5YEGu5+cP47E5WmIzhZ2oaBCTe:sbvbOv5/WiHMk7iz5YEz+cQ45WmI9ZJo

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks