General

  • Target

    fd5df6ee224f90be29c3ba0ee9499272_JaffaCakes118

  • Size

    1.8MB

  • Sample

    240928-3k5hdstfnb

  • MD5

    fd5df6ee224f90be29c3ba0ee9499272

  • SHA1

    758619e97357a92302cda2f4cef29b58ef722131

  • SHA256

    53df442c12910331386a1cbcba0e987fc2ee93a0d661dfc8983f88dac4179080

  • SHA512

    e361c04a18e7486586b20671ff10d27da8383a9fd8d6f4c4425c2bbd14b5a5bc392d2f7751d112bd795c55381f889cbafea8c97d0f8193b500529a7217fccaa6

  • SSDEEP

    49152:JkGl/1ZhF66T3pGM0PUFaJl+q8tEr+Y5aTQY2QrIbp+J6nXcyCLwnYn4ftnH74r1:JkGl/1ZhB3pGMvw+/E35qQY30N+Jayc+

Malware Config

Targets

    • Target

      fd5df6ee224f90be29c3ba0ee9499272_JaffaCakes118

    • Size

      1.8MB

    • MD5

      fd5df6ee224f90be29c3ba0ee9499272

    • SHA1

      758619e97357a92302cda2f4cef29b58ef722131

    • SHA256

      53df442c12910331386a1cbcba0e987fc2ee93a0d661dfc8983f88dac4179080

    • SHA512

      e361c04a18e7486586b20671ff10d27da8383a9fd8d6f4c4425c2bbd14b5a5bc392d2f7751d112bd795c55381f889cbafea8c97d0f8193b500529a7217fccaa6

    • SSDEEP

      49152:JkGl/1ZhF66T3pGM0PUFaJl+q8tEr+Y5aTQY2QrIbp+J6nXcyCLwnYn4ftnH74r1:JkGl/1ZhB3pGMvw+/E35qQY30N+Jayc+

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks