General

  • Target

    86e270048f1002629f25310a6928451e_JaffaCakes118

  • Size

    10.9MB

  • Sample

    240810-veeqsaseqb

  • MD5

    86e270048f1002629f25310a6928451e

  • SHA1

    0f3e0ca9f47ae3564c5ec66c9c54510a911ec237

  • SHA256

    1db2bd0d80674f8e85f3deea261dfcca65ed3f37ad5e8cda9da21b522ad28b43

  • SHA512

    43c8aa6f36620a84196ab4111fe4480e320aafcea8beeae5b2218b400bbe780c7bb3a28e087f282c0f41c6172d28348a7e104b01945b5bda9b0accb5ccb9ccdc

  • SSDEEP

    196608:PjPPtdbTOC9YAPX7+6LZYYqRYRsqWoSVIqpu/Hoe9nlKBJ4miL4y44mPPkyVL:DtdfB7+6LZt8iAJe9nlKBFkiHVL

Malware Config

Targets

    • Target

      86e270048f1002629f25310a6928451e_JaffaCakes118

    • Size

      10.9MB

    • MD5

      86e270048f1002629f25310a6928451e

    • SHA1

      0f3e0ca9f47ae3564c5ec66c9c54510a911ec237

    • SHA256

      1db2bd0d80674f8e85f3deea261dfcca65ed3f37ad5e8cda9da21b522ad28b43

    • SHA512

      43c8aa6f36620a84196ab4111fe4480e320aafcea8beeae5b2218b400bbe780c7bb3a28e087f282c0f41c6172d28348a7e104b01945b5bda9b0accb5ccb9ccdc

    • SSDEEP

      196608:PjPPtdbTOC9YAPX7+6LZYYqRYRsqWoSVIqpu/Hoe9nlKBJ4miL4y44mPPkyVL:DtdfB7+6LZt8iAJe9nlKBFkiHVL

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks