General

  • Target

    e0d83b5a8506d10811524c311ecc476c_JaffaCakes118

  • Size

    10.6MB

  • Sample

    240914-xs5kgazhkq

  • MD5

    e0d83b5a8506d10811524c311ecc476c

  • SHA1

    05acd313f3428f8395c493117edd69093933a4af

  • SHA256

    63eec91e34b202ee2f9e54c7902715f5837e55859d67c150dd9e5976139b62d8

  • SHA512

    a99fb0c62e07c8cae68490da4fc28b5ae1da20d1fb196f9baf69d078066d0f542059b618c1b8ff455002c7c6a064e5f528774744807606999bd27f5e92c397d6

  • SSDEEP

    196608:SsOEwis1RLWy/wOQOk5J5EhU5TlQZGBWk/02hwSxiIht9HrrrrrrRI1IkTv2byk:RwisHCaKOkS+HDRri2PHrrrrrrK1IkTk

Malware Config

Targets

    • Target

      e0d83b5a8506d10811524c311ecc476c_JaffaCakes118

    • Size

      10.6MB

    • MD5

      e0d83b5a8506d10811524c311ecc476c

    • SHA1

      05acd313f3428f8395c493117edd69093933a4af

    • SHA256

      63eec91e34b202ee2f9e54c7902715f5837e55859d67c150dd9e5976139b62d8

    • SHA512

      a99fb0c62e07c8cae68490da4fc28b5ae1da20d1fb196f9baf69d078066d0f542059b618c1b8ff455002c7c6a064e5f528774744807606999bd27f5e92c397d6

    • SSDEEP

      196608:SsOEwis1RLWy/wOQOk5J5EhU5TlQZGBWk/02hwSxiIht9HrrrrrrRI1IkTv2byk:RwisHCaKOkS+HDRri2PHrrrrrrK1IkTk

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Queries information about active data network

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks