General

  • Target

    b54a9260a206f2a517f857579f7336f5_JaffaCakes118

  • Size

    9.4MB

  • Sample

    240616-1bgzmayeqd

  • MD5

    b54a9260a206f2a517f857579f7336f5

  • SHA1

    05fef422d871119f9092477ad6618bcb6006c6cc

  • SHA256

    061aa166ec774cd7c8c95c12c9a8c11588250d618b80d04d900720cc5389bb3b

  • SHA512

    964ed3b4d9d29f4caaada783a66f1afebe0f541ab184fa9190d8feb5daee1da6ef2d12abd2cd425b4d42fea052377e65391ab43d1792c7b2a53685e6641e46a3

  • SSDEEP

    196608:PQC1rZ+w7swG46a9mVk+e4lf0whQE1P95a1quSYBMwoe3/FB:oCH+w7swLnPw04QiIqeUe3/H

Malware Config

Targets

    • Target

      b54a9260a206f2a517f857579f7336f5_JaffaCakes118

    • Size

      9.4MB

    • MD5

      b54a9260a206f2a517f857579f7336f5

    • SHA1

      05fef422d871119f9092477ad6618bcb6006c6cc

    • SHA256

      061aa166ec774cd7c8c95c12c9a8c11588250d618b80d04d900720cc5389bb3b

    • SHA512

      964ed3b4d9d29f4caaada783a66f1afebe0f541ab184fa9190d8feb5daee1da6ef2d12abd2cd425b4d42fea052377e65391ab43d1792c7b2a53685e6641e46a3

    • SSDEEP

      196608:PQC1rZ+w7swG46a9mVk+e4lf0whQE1P95a1quSYBMwoe3/FB:oCH+w7swLnPw04QiIqeUe3/H

    • Checks if the Android device is rooted.

    • Checks Android system properties for emulator presence.

    • Checks Qemu related system properties.

      Checks for Android system properties related to Qemu for Emulator detection.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks