General

  • Target

    b5aca0413654627b1377dd0e5118750c_JaffaCakes118

  • Size

    4.9MB

  • Sample

    240822-ayx19ashkn

  • MD5

    b5aca0413654627b1377dd0e5118750c

  • SHA1

    9831383822a84d912a5303f3da749b1ba3b2fe09

  • SHA256

    582e9825e6d6b27bd627af93afc188809e35a5c74d6646c95df4038abccc1889

  • SHA512

    4d18a04a0267ecc1b58499d85f878d5ce87486ba358c74395b5efe1cd6d6a3ea3c8a9fda4829d5403d586c76aba7bac4da94662de7676d5debe811f23fb16747

  • SSDEEP

    98304:Xzdxc6dTodeM68mgU+ZKVRDISlEW79QnSx2NAP2nijXyvRyeneY:76PbmaZKnI+EW2SUnniLy5P

Malware Config

Targets

    • Target

      b5aca0413654627b1377dd0e5118750c_JaffaCakes118

    • Size

      4.9MB

    • MD5

      b5aca0413654627b1377dd0e5118750c

    • SHA1

      9831383822a84d912a5303f3da749b1ba3b2fe09

    • SHA256

      582e9825e6d6b27bd627af93afc188809e35a5c74d6646c95df4038abccc1889

    • SHA512

      4d18a04a0267ecc1b58499d85f878d5ce87486ba358c74395b5efe1cd6d6a3ea3c8a9fda4829d5403d586c76aba7bac4da94662de7676d5debe811f23fb16747

    • SSDEEP

      98304:Xzdxc6dTodeM68mgU+ZKVRDISlEW79QnSx2NAP2nijXyvRyeneY:76PbmaZKnI+EW2SUnniLy5P

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks