General

  • Target

    b4c6b383e262e14182ad09d91bd7e70a_JaffaCakes118

  • Size

    5.7MB

  • Sample

    240616-xzy19sxfjk

  • MD5

    b4c6b383e262e14182ad09d91bd7e70a

  • SHA1

    4b5940ae51498243dc8cbc371ea5563a8f0f1c3a

  • SHA256

    29b48fb0b4dbddb296a29db4d170a0db8b0292bbb54d3366be692de4e6024525

  • SHA512

    774f6f2326fce794735ab415a54fe63c70272e82dbee139bfe6182a31574856296d47387c7dd755ebaddd139ecfcefeb8348a5054a39b7e1d8ae6c9b5d2cc310

  • SSDEEP

    98304:hrN3jgDXGmAVDGByJBuIOGYmwUypXRf+/GS4aAvCQhnq9hIwDDZ4uv4L6b7v:lNUixcyKvmwUypXRfWVAvCsn+WwXrALG

Malware Config

Targets

    • Target

      b4c6b383e262e14182ad09d91bd7e70a_JaffaCakes118

    • Size

      5.7MB

    • MD5

      b4c6b383e262e14182ad09d91bd7e70a

    • SHA1

      4b5940ae51498243dc8cbc371ea5563a8f0f1c3a

    • SHA256

      29b48fb0b4dbddb296a29db4d170a0db8b0292bbb54d3366be692de4e6024525

    • SHA512

      774f6f2326fce794735ab415a54fe63c70272e82dbee139bfe6182a31574856296d47387c7dd755ebaddd139ecfcefeb8348a5054a39b7e1d8ae6c9b5d2cc310

    • SSDEEP

      98304:hrN3jgDXGmAVDGByJBuIOGYmwUypXRf+/GS4aAvCQhnq9hIwDDZ4uv4L6b7v:lNUixcyKvmwUypXRfWVAvCsn+WwXrALG

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks