General

  • Target

    81c8d7dcbdf7b85f49d5587992ec5259_JaffaCakes118

  • Size

    10.0MB

  • Sample

    240801-1aw26a1cpa

  • MD5

    81c8d7dcbdf7b85f49d5587992ec5259

  • SHA1

    ebb90557b03889944955b918e7d2eaad500893d2

  • SHA256

    5d0569a973a3484e07593949106a2c8afbb175551764fc79cc2473a151514752

  • SHA512

    8f822ea6771cd1e9120964c8f809aa102ebb937b06077cc2951583aa9d70aa2dfeba38f38816b9e2ebd1e62d5bcb6351f16de4958b12bde4a95ab2e00f3351c6

  • SSDEEP

    196608:Idj0sDa1SHYSAcPVTks5xtgaLMABH8wo1dkB8FmRDnsHjgtX:Idj0kcJSf/5jIC8wo1yiER0oX

Malware Config

Targets

    • Target

      81c8d7dcbdf7b85f49d5587992ec5259_JaffaCakes118

    • Size

      10.0MB

    • MD5

      81c8d7dcbdf7b85f49d5587992ec5259

    • SHA1

      ebb90557b03889944955b918e7d2eaad500893d2

    • SHA256

      5d0569a973a3484e07593949106a2c8afbb175551764fc79cc2473a151514752

    • SHA512

      8f822ea6771cd1e9120964c8f809aa102ebb937b06077cc2951583aa9d70aa2dfeba38f38816b9e2ebd1e62d5bcb6351f16de4958b12bde4a95ab2e00f3351c6

    • SSDEEP

      196608:Idj0sDa1SHYSAcPVTks5xtgaLMABH8wo1dkB8FmRDnsHjgtX:Idj0kcJSf/5jIC8wo1yiER0oX

    • Checks if the Android device is rooted.

    • Checks Android system properties for emulator presence.

    • Checks Qemu related system properties.

      Checks for Android system properties related to Qemu for Emulator detection.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks