General

  • Target

    2341578500e6d4ea1e38d80a52529aa1_JaffaCakes118

  • Size

    7.7MB

  • Sample

    240703-whhghs1bqr

  • MD5

    2341578500e6d4ea1e38d80a52529aa1

  • SHA1

    d7204079259bda4febf3a9bed5d16d82e5521fe2

  • SHA256

    4b1f36973cbb8506e358db78aabd00b51f3af3eba7e03f8dc04894f8c2350319

  • SHA512

    c860480d766f409374923bcc7cb6931b93cd0d9a6b8e7eafd2979e9c7f3303c7380668145b1c2cf6853dc847dd0f44340b92b974d02da5226f06bc421642834a

  • SSDEEP

    196608:UYJoVYCoLRtMzG+YTiIPRGcyBJHip1OMNT6S:ULYvRqq+iiIP+ip1OMF6S

Malware Config

Targets

    • Target

      2341578500e6d4ea1e38d80a52529aa1_JaffaCakes118

    • Size

      7.7MB

    • MD5

      2341578500e6d4ea1e38d80a52529aa1

    • SHA1

      d7204079259bda4febf3a9bed5d16d82e5521fe2

    • SHA256

      4b1f36973cbb8506e358db78aabd00b51f3af3eba7e03f8dc04894f8c2350319

    • SHA512

      c860480d766f409374923bcc7cb6931b93cd0d9a6b8e7eafd2979e9c7f3303c7380668145b1c2cf6853dc847dd0f44340b92b974d02da5226f06bc421642834a

    • SSDEEP

      196608:UYJoVYCoLRtMzG+YTiIPRGcyBJHip1OMNT6S:ULYvRqq+iiIP+ip1OMF6S

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks