General

  • Target

    ba9a988868ded438a4178f271819a580_JaffaCakes118

  • Size

    30.8MB

  • Sample

    240618-jvfggaybnj

  • MD5

    ba9a988868ded438a4178f271819a580

  • SHA1

    62e296dcfa2d29f1dca80f522274376b2851a8a5

  • SHA256

    f07a5b59f2dba248d012676c861c71b16d31ef6fb50b20c297bf9e6482e7ab26

  • SHA512

    e300209a7e7cf6b058ed2b6147fde96769e8e05609b6e57c4eef9a809b46ea426fcfe2b1ba76855f4146d6f1554352c0bfd766732930b79590e5c4830526e64e

  • SSDEEP

    786432:O/aC4MSyPCEJXK6OpWS6VD+TQ3X8A6wsykk/0+DFv:OyKKEJXx+QcOJ/3Fv

Malware Config

Targets

    • Target

      ba9a988868ded438a4178f271819a580_JaffaCakes118

    • Size

      30.8MB

    • MD5

      ba9a988868ded438a4178f271819a580

    • SHA1

      62e296dcfa2d29f1dca80f522274376b2851a8a5

    • SHA256

      f07a5b59f2dba248d012676c861c71b16d31ef6fb50b20c297bf9e6482e7ab26

    • SHA512

      e300209a7e7cf6b058ed2b6147fde96769e8e05609b6e57c4eef9a809b46ea426fcfe2b1ba76855f4146d6f1554352c0bfd766732930b79590e5c4830526e64e

    • SSDEEP

      786432:O/aC4MSyPCEJXK6OpWS6VD+TQ3X8A6wsykk/0+DFv:OyKKEJXx+QcOJ/3Fv

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

    • Target

      plugin-deploy.jar

    • Size

      143KB

    • MD5

      e2c47c231d27f082fd61c159aa105d75

    • SHA1

      79fcdcea972aeb2bb7f5ccdc20e8aa3ac1608395

    • SHA256

      8d4d1d443966c84fe656b33153e338e72251f21b6f18b869cad685506b6435c4

    • SHA512

      4f0cbcab419abf2ca89955c0240533bec51abe53c8364f469cf29b8822e0b9aab168dc0d78cf3ff53b4bfbcc687925d6c9e2ad8fa95f6557f30e5f4ffd3fa091

    • SSDEEP

      3072:WyHWAPxG0lraATjL12iL9mDoDjUDKRWfv+GT4ALHO7khBih:ZxGZIJ2Q9mCUDKbILHrhq

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks