General

  • Target

    b808f44a8e099ba8fcfa4c43b0959194_JaffaCakes118

  • Size

    29.2MB

  • Sample

    240617-l22z6azdjq

  • MD5

    b808f44a8e099ba8fcfa4c43b0959194

  • SHA1

    4680aa47502d5b2f20728cb1255232538f6b8786

  • SHA256

    39d28fa991988956a29b5688de9569a3c1d1df949d4f0ef744ff29648b199b9a

  • SHA512

    5af21be84440d0bbf76021274f8a4a3c9256f713bd0da083c1d255d5aa0317ce2311ef11427030d7e5abb8a8c6e816c24101b2abad3f70b45593d46973a73f0f

  • SSDEEP

    786432:P4+DaeP4iVdibsTafQbPIBGFg1yT/mvk5Kr1Ti8xeHnbnBA:PpWeBwbWP0GFUS6lrB9xe7nBA

Malware Config

Targets

    • Target

      b808f44a8e099ba8fcfa4c43b0959194_JaffaCakes118

    • Size

      29.2MB

    • MD5

      b808f44a8e099ba8fcfa4c43b0959194

    • SHA1

      4680aa47502d5b2f20728cb1255232538f6b8786

    • SHA256

      39d28fa991988956a29b5688de9569a3c1d1df949d4f0ef744ff29648b199b9a

    • SHA512

      5af21be84440d0bbf76021274f8a4a3c9256f713bd0da083c1d255d5aa0317ce2311ef11427030d7e5abb8a8c6e816c24101b2abad3f70b45593d46973a73f0f

    • SSDEEP

      786432:P4+DaeP4iVdibsTafQbPIBGFg1yT/mvk5Kr1Ti8xeHnbnBA:PpWeBwbWP0GFUS6lrB9xe7nBA

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Acquires the wake lock

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks