General

  • Target

    c24a0ed0d2f205ed675904d46d56453e_JaffaCakes118

  • Size

    18.5MB

  • Sample

    240826-e6lemswhrk

  • MD5

    c24a0ed0d2f205ed675904d46d56453e

  • SHA1

    906723e1c01d20e9a9022516afcf1aedcb372614

  • SHA256

    4cdb139dbaf627b88f79cebea3ec17f20e51e7474970d55288b040d7c7070f4a

  • SHA512

    a5bf54007d1fb1febfcfe20f292d34a14e9f2afe3d21ec0aaa758c0d34ba4234c034a512b1c0cfae8a5826755c71ba00880956db73fdd06ecbf4ef5588331b31

  • SSDEEP

    393216:KQ94ZaLDObycu63yJocUazxzr2rzBY7TJXBs8XNxadrAMmm:YofO+cuRJtUazx3Qz+TBB/s

Malware Config

Targets

    • Target

      c24a0ed0d2f205ed675904d46d56453e_JaffaCakes118

    • Size

      18.5MB

    • MD5

      c24a0ed0d2f205ed675904d46d56453e

    • SHA1

      906723e1c01d20e9a9022516afcf1aedcb372614

    • SHA256

      4cdb139dbaf627b88f79cebea3ec17f20e51e7474970d55288b040d7c7070f4a

    • SHA512

      a5bf54007d1fb1febfcfe20f292d34a14e9f2afe3d21ec0aaa758c0d34ba4234c034a512b1c0cfae8a5826755c71ba00880956db73fdd06ecbf4ef5588331b31

    • SSDEEP

      393216:KQ94ZaLDObycu63yJocUazxzr2rzBY7TJXBs8XNxadrAMmm:YofO+cuRJtUazx3Qz+TBB/s

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

MITRE ATT&CK Mobile v15

Tasks