General

  • Target

    bd3f2adb4ae31aeeff3c09fcd12e03e5_JaffaCakes118

  • Size

    9.3MB

  • Sample

    240823-1gcxvsyana

  • MD5

    bd3f2adb4ae31aeeff3c09fcd12e03e5

  • SHA1

    5609560a00fc9b3c70dc8370abe809efe2c7ceea

  • SHA256

    1ede8132af2e6ece7aae3782f754cc454f725bbc85fd17a93bd6eabd40688443

  • SHA512

    6a98d238a6678475a68d85df738dc084e1e747b3b7d45c6fd0c0c7c756ccb323cf9deea3ee8093d9f1ada8458a8ccaa0463083ce7688667afb496437bca0ec37

  • SSDEEP

    196608:W+eJROtGaDdYSSU3l488Gts7gdmfFCGjbL/b26KnQOe:W+cCGKYYC1Gts/Ekfj2kOe

Malware Config

Targets

    • Target

      bd3f2adb4ae31aeeff3c09fcd12e03e5_JaffaCakes118

    • Size

      9.3MB

    • MD5

      bd3f2adb4ae31aeeff3c09fcd12e03e5

    • SHA1

      5609560a00fc9b3c70dc8370abe809efe2c7ceea

    • SHA256

      1ede8132af2e6ece7aae3782f754cc454f725bbc85fd17a93bd6eabd40688443

    • SHA512

      6a98d238a6678475a68d85df738dc084e1e747b3b7d45c6fd0c0c7c756ccb323cf9deea3ee8093d9f1ada8458a8ccaa0463083ce7688667afb496437bca0ec37

    • SSDEEP

      196608:W+eJROtGaDdYSSU3l488Gts7gdmfFCGjbL/b26KnQOe:W+cCGKYYC1Gts/Ekfj2kOe

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Checks the application is allowed to request package installs through the package installer

      Checks the application is allowed to install additional applications (Might try to install applications from unknown sources).

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests allowing to install additional applications from unknown sources.

    • Checks the presence of a debugger

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks