General

  • Target

    d5f9723cb6ed16b62d276a28beb9204a_JaffaCakes118

  • Size

    25.8MB

  • Sample

    240909-km2keasdle

  • MD5

    d5f9723cb6ed16b62d276a28beb9204a

  • SHA1

    8247e2553e1a6f7f7ce59b1125b034545eb2562e

  • SHA256

    e974a90e1faf600571354adc1bff3d4b84a30aad5c752a4c3047a92d462c9ca8

  • SHA512

    bc75f850a6dbeff386391e3e5bbbff756ee4e91465d524c442509b96c2a2d1a7e90f7794d667fe02cbe352ba50d0c6af3191ce95759f158eae6eb5c477bcf4eb

  • SSDEEP

    786432:0x3gIs26CMtqPzPhE3UqLi9z5ZUif1wKVY:yQG66PVaUzbfzy

Malware Config

Targets

    • Target

      d5f9723cb6ed16b62d276a28beb9204a_JaffaCakes118

    • Size

      25.8MB

    • MD5

      d5f9723cb6ed16b62d276a28beb9204a

    • SHA1

      8247e2553e1a6f7f7ce59b1125b034545eb2562e

    • SHA256

      e974a90e1faf600571354adc1bff3d4b84a30aad5c752a4c3047a92d462c9ca8

    • SHA512

      bc75f850a6dbeff386391e3e5bbbff756ee4e91465d524c442509b96c2a2d1a7e90f7794d667fe02cbe352ba50d0c6af3191ce95759f158eae6eb5c477bcf4eb

    • SSDEEP

      786432:0x3gIs26CMtqPzPhE3UqLi9z5ZUif1wKVY:yQG66PVaUzbfzy

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks