General

  • Target

    b54350c52dd2d16099232d039f116a6a_JaffaCakes118

  • Size

    14.2MB

  • Sample

    240821-17qlmstdqa

  • MD5

    b54350c52dd2d16099232d039f116a6a

  • SHA1

    67ae60794623ec3fc565711c4d9fa276fbff44fe

  • SHA256

    5824e33e3bca79ba8ce955e83f610e8ff3401e0e6f46efabc26bc496e97a1071

  • SHA512

    9e0361bfcbf3e668c34b01f57c05e2cb41c36426194d557dfea3044fc458744a8807ca55ecf3d7a025f37f9fae6e9e286dc2152fd45a1bcc40a7a3e95d3ea88e

  • SSDEEP

    393216:3x2QCKXTOwUcNNG4XCb0ddOEl75RkhfPll4gVJIoORDH:3xLOsnxrunbJVzORDH

Malware Config

Targets

    • Target

      b54350c52dd2d16099232d039f116a6a_JaffaCakes118

    • Size

      14.2MB

    • MD5

      b54350c52dd2d16099232d039f116a6a

    • SHA1

      67ae60794623ec3fc565711c4d9fa276fbff44fe

    • SHA256

      5824e33e3bca79ba8ce955e83f610e8ff3401e0e6f46efabc26bc496e97a1071

    • SHA512

      9e0361bfcbf3e668c34b01f57c05e2cb41c36426194d557dfea3044fc458744a8807ca55ecf3d7a025f37f9fae6e9e286dc2152fd45a1bcc40a7a3e95d3ea88e

    • SSDEEP

      393216:3x2QCKXTOwUcNNG4XCb0ddOEl75RkhfPll4gVJIoORDH:3xLOsnxrunbJVzORDH

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks