General

  • Target

    1542de6835d0a97b7edd7eb2f21aec79_JaffaCakes118

  • Size

    1.5MB

  • Sample

    240627-jzsmlazfkf

  • MD5

    1542de6835d0a97b7edd7eb2f21aec79

  • SHA1

    5addc9b49993dd1cc0c7243f00e975c81b5d6135

  • SHA256

    f68a71f696c2cf42bc1e6717644d7cbe975435cb28bff24f5dd4328f7f0c22a8

  • SHA512

    146e2ae62c1897a6ad505a075498009d058f73ae6e922171b48d1838f196e9883fad445ad7bb66e9a9aebdb8a5a4251502495f8a78cd813226e04c5b00f425a4

  • SSDEEP

    49152:wy+a6u1yQfS6pFJoo0Eo9AOOniENtADy3MGI:wx3iSkFJo28OiER8GI

Malware Config

Targets

    • Target

      1542de6835d0a97b7edd7eb2f21aec79_JaffaCakes118

    • Size

      1.5MB

    • MD5

      1542de6835d0a97b7edd7eb2f21aec79

    • SHA1

      5addc9b49993dd1cc0c7243f00e975c81b5d6135

    • SHA256

      f68a71f696c2cf42bc1e6717644d7cbe975435cb28bff24f5dd4328f7f0c22a8

    • SHA512

      146e2ae62c1897a6ad505a075498009d058f73ae6e922171b48d1838f196e9883fad445ad7bb66e9a9aebdb8a5a4251502495f8a78cd813226e04c5b00f425a4

    • SSDEEP

      49152:wy+a6u1yQfS6pFJoo0Eo9AOOniENtADy3MGI:wx3iSkFJo28OiER8GI

    • Checks if the Android device is rooted.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks