General

  • Target

    b49401ce9e657c1521f2528d8bb32f88_JaffaCakes118

  • Size

    14.5MB

  • Sample

    240616-w5l38awclm

  • MD5

    b49401ce9e657c1521f2528d8bb32f88

  • SHA1

    bd43bf261a891756688dcac01962600a06d55772

  • SHA256

    a5e371c3704c27dd95b46152d6154117fa222366db29699a331475ad5a5d7dd5

  • SHA512

    6015c54300b9f45e0df02a4cfca5c1f737fea97ae1cb58a39159da1fa92292732f55b6f33b26c58e7fdd2adec6dbccb5e03396a0bdfc7be47e2cbf442930fca5

  • SSDEEP

    196608:Xk/wpVb17tVoLM3WlUv24sxB171cs0QwB5GJ/d/NxAaT6RENPuJs9SArXiyj4Ydb:JHl/n3aH7Gjk4RE1noATiysYdG7M

Malware Config

Targets

    • Target

      b49401ce9e657c1521f2528d8bb32f88_JaffaCakes118

    • Size

      14.5MB

    • MD5

      b49401ce9e657c1521f2528d8bb32f88

    • SHA1

      bd43bf261a891756688dcac01962600a06d55772

    • SHA256

      a5e371c3704c27dd95b46152d6154117fa222366db29699a331475ad5a5d7dd5

    • SHA512

      6015c54300b9f45e0df02a4cfca5c1f737fea97ae1cb58a39159da1fa92292732f55b6f33b26c58e7fdd2adec6dbccb5e03396a0bdfc7be47e2cbf442930fca5

    • SSDEEP

      196608:Xk/wpVb17tVoLM3WlUv24sxB171cs0QwB5GJ/d/NxAaT6RENPuJs9SArXiyj4Ydb:JHl/n3aH7Gjk4RE1noATiysYdG7M

    • Checks if the Android device is rooted.

    • Checks Android system properties for emulator presence.

    • Checks Qemu related system properties.

      Checks for Android system properties related to Qemu for Emulator detection.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks