General

  • Target

    2eb664282d38fcc239db9fcd56bf2dc3_JaffaCakes118

  • Size

    1.3MB

  • Sample

    240709-c6ldjavbqd

  • MD5

    2eb664282d38fcc239db9fcd56bf2dc3

  • SHA1

    c522d9ea9ddd28b8e2656f172cb01b347d2679ce

  • SHA256

    d2be660b8c71a35f85ec5a50981d952e78c77f83cfa092c75a254301f7e97313

  • SHA512

    6f8048a0a35f7e9258e88b06803fb76f0c9ffa9a6b3a458f48c6b3829c43f63c21668b13bf9e076cea35aac7e767af594b96867df682bed49249fa785b768fe8

  • SSDEEP

    24576:Ee8yQL5SbyDI8PPwZLDGfVt+dDn/0JZ5ISsnC0JEqoA/Rq4:EeBQJDI8PoZm+T/0X5IHQ5I44

Malware Config

Targets

    • Target

      2eb664282d38fcc239db9fcd56bf2dc3_JaffaCakes118

    • Size

      1.3MB

    • MD5

      2eb664282d38fcc239db9fcd56bf2dc3

    • SHA1

      c522d9ea9ddd28b8e2656f172cb01b347d2679ce

    • SHA256

      d2be660b8c71a35f85ec5a50981d952e78c77f83cfa092c75a254301f7e97313

    • SHA512

      6f8048a0a35f7e9258e88b06803fb76f0c9ffa9a6b3a458f48c6b3829c43f63c21668b13bf9e076cea35aac7e767af594b96867df682bed49249fa785b768fe8

    • SSDEEP

      24576:Ee8yQL5SbyDI8PPwZLDGfVt+dDn/0JZ5ISsnC0JEqoA/Rq4:EeBQJDI8PoZm+T/0X5IHQ5I44

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks