General

  • Target

    939a478aadca94bf92bd4fd9170308f0_JaffaCakes118

  • Size

    13.8MB

  • Sample

    240813-sh2nlszhne

  • MD5

    939a478aadca94bf92bd4fd9170308f0

  • SHA1

    8af41a80aad05f85f1121506ee6f217272bcc4f5

  • SHA256

    976cc5ec0ff2fa47b69cd0c05c89646220177849f2ad9db459f99f63bbb0cb29

  • SHA512

    6b7e77bcde8c4c919def53c8aac7b53dbf2fabda63c506dfe36e86df2936a1743b8401e2cd720e493dcfb34cb61915ab7d1922479c60b90b80c48998aa825802

  • SSDEEP

    393216:xKI+wAoQPd3POasnXnTNaEwQm+s52qOBvIE5EibICZ1YPkM:xxKhP9PVEXnAdaVvHJdG

Malware Config

Targets

    • Target

      939a478aadca94bf92bd4fd9170308f0_JaffaCakes118

    • Size

      13.8MB

    • MD5

      939a478aadca94bf92bd4fd9170308f0

    • SHA1

      8af41a80aad05f85f1121506ee6f217272bcc4f5

    • SHA256

      976cc5ec0ff2fa47b69cd0c05c89646220177849f2ad9db459f99f63bbb0cb29

    • SHA512

      6b7e77bcde8c4c919def53c8aac7b53dbf2fabda63c506dfe36e86df2936a1743b8401e2cd720e493dcfb34cb61915ab7d1922479c60b90b80c48998aa825802

    • SSDEEP

      393216:xKI+wAoQPd3POasnXnTNaEwQm+s52qOBvIE5EibICZ1YPkM:xxKhP9PVEXnAdaVvHJdG

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks