General

  • Target

    ad5a70706be4aeab629291ba58aea57d_JaffaCakes118

  • Size

    6.1MB

  • Sample

    240820-bq4z9swgke

  • MD5

    ad5a70706be4aeab629291ba58aea57d

  • SHA1

    22287ad276db1897247999c1323433c85d90d1af

  • SHA256

    b07ba1c3c75dcbc3b940fdb5600acd75b6ff4c093af3e907734727170540025a

  • SHA512

    58e76d9cdb369ae3425590334799a63a2e9b921aa34ac7b19d8f5ae5539a92c90a45e3f6518d9f40ef82927f3b65f18f9959d4bd37361231e81db89dd8eb3449

  • SSDEEP

    196608:elWVGbqBk+aw+yrONA2wq+6m/u0ESHVT7:elWgQk+aUON9h+TzE0T7

Malware Config

Targets

    • Target

      ad5a70706be4aeab629291ba58aea57d_JaffaCakes118

    • Size

      6.1MB

    • MD5

      ad5a70706be4aeab629291ba58aea57d

    • SHA1

      22287ad276db1897247999c1323433c85d90d1af

    • SHA256

      b07ba1c3c75dcbc3b940fdb5600acd75b6ff4c093af3e907734727170540025a

    • SHA512

      58e76d9cdb369ae3425590334799a63a2e9b921aa34ac7b19d8f5ae5539a92c90a45e3f6518d9f40ef82927f3b65f18f9959d4bd37361231e81db89dd8eb3449

    • SSDEEP

      196608:elWVGbqBk+aw+yrONA2wq+6m/u0ESHVT7:elWgQk+aUON9h+TzE0T7

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks