General

  • Target

    ea908c8107d4997c01c51f81943cc1ad_JaffaCakes118

  • Size

    31.6MB

  • Sample

    240919-etwd3szhnf

  • MD5

    ea908c8107d4997c01c51f81943cc1ad

  • SHA1

    036d458c83474ef6d1adedf47382a67393d9c8e8

  • SHA256

    852b18f2bb5d88a9b752eb32af0ef66ad9874dc6d07908d23c9923b3554a6b84

  • SHA512

    33528d1e8a77cb33da8d5e36ebe7f8f0b136ab2ed636144523829ebbb4546b368cba46e0017a746c3cc907a19c0116faa21ff1b0f2cf7a6ab2c5e31798162c72

  • SSDEEP

    786432:OXexxnYH3BRCv9Ly3LOfyQm+RByw3BMeIqWLxnB8NJo+r6opq+xLGM:Ue7E3+Zy7OLm+zklqSxB8NT685xKM

Malware Config

Targets

    • Target

      ea908c8107d4997c01c51f81943cc1ad_JaffaCakes118

    • Size

      31.6MB

    • MD5

      ea908c8107d4997c01c51f81943cc1ad

    • SHA1

      036d458c83474ef6d1adedf47382a67393d9c8e8

    • SHA256

      852b18f2bb5d88a9b752eb32af0ef66ad9874dc6d07908d23c9923b3554a6b84

    • SHA512

      33528d1e8a77cb33da8d5e36ebe7f8f0b136ab2ed636144523829ebbb4546b368cba46e0017a746c3cc907a19c0116faa21ff1b0f2cf7a6ab2c5e31798162c72

    • SSDEEP

      786432:OXexxnYH3BRCv9Ly3LOfyQm+RByw3BMeIqWLxnB8NJo+r6opq+xLGM:Ue7E3+Zy7OLm+zklqSxB8NT685xKM

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks