General

  • Target

    efc04ade17b84a4bc1f48e548ca58e3c_JaffaCakes118

  • Size

    31.8MB

  • Sample

    240921-n71ema1gjj

  • MD5

    efc04ade17b84a4bc1f48e548ca58e3c

  • SHA1

    aaee98274a1b62e345d12d383f5a82d795f3725f

  • SHA256

    d2510f1e716c596dc74c9916f7054ed185fffea956b40faac0ba3ccb960f7afe

  • SHA512

    729d256fa9dd76753009c5f066317a73dece23a905ad9bd184291de9faabd03a8fd541f4ec3b98709e8b3b6cc1994b54afd1029bb2eb5b8deeafcde141a5ceb2

  • SSDEEP

    786432:Ui/yvZ3ERQTw9mYMDqf1UXDKeWPQye0x8muybkTP:Ui/yvZnw9mYgTKNP3qP

Malware Config

Targets

    • Target

      efc04ade17b84a4bc1f48e548ca58e3c_JaffaCakes118

    • Size

      31.8MB

    • MD5

      efc04ade17b84a4bc1f48e548ca58e3c

    • SHA1

      aaee98274a1b62e345d12d383f5a82d795f3725f

    • SHA256

      d2510f1e716c596dc74c9916f7054ed185fffea956b40faac0ba3ccb960f7afe

    • SHA512

      729d256fa9dd76753009c5f066317a73dece23a905ad9bd184291de9faabd03a8fd541f4ec3b98709e8b3b6cc1994b54afd1029bb2eb5b8deeafcde141a5ceb2

    • SSDEEP

      786432:Ui/yvZ3ERQTw9mYMDqf1UXDKeWPQye0x8muybkTP:Ui/yvZnw9mYgTKNP3qP

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Target

      alipay_msp.apk

    • Size

      354KB

    • MD5

      89c04e1ebcd58eca6dd93211628ed0bc

    • SHA1

      7d1e77ce25a635299704dbd95bd95c697572ea9d

    • SHA256

      ee3c608fff51b313f4e0b3e542bedccb4d4db4c8eb44e63bf4be0d468e9ee117

    • SHA512

      3dccaeff9906401855f3071c91012926d7e9250674ea0bb89606e4862223a8343fc7b9369afe4e50031d261b45437107c018f565da5615c49721c3bf1bf6ed01

    • SSDEEP

      6144:cH8LfOo+BjGVN8TdW4zxgnm1Us3JuOK2vf5C8EcPK+WvyQcQ2fnq7:cHLxBiVN8pWggmlY25CLE8RcQ2fnq7

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks