General

  • Target

    fd1749361ad145e068db8c1a8ce09584_JaffaCakes118

  • Size

    13.8MB

  • Sample

    240928-zbmdnsyane

  • MD5

    fd1749361ad145e068db8c1a8ce09584

  • SHA1

    10de95047a4c6989ff96173e001f2354ea6c6928

  • SHA256

    3b0a9f83e9cd801602820a12312d6140601fe5a611338c13bbb1fba6939bedac

  • SHA512

    c443625ea09b870a71db8db6fec1f8143df9ca5ec65413794cf8feb2107921a12ad495bc71f0e6b5811d1ef83b9b74084530e9ffa2693c1a6a6e16e08fc25eb6

  • SSDEEP

    393216:G88o+0j6Z3eXpXYi625U9U8bvFNST/J+P3S+kgsc2oW/uOF:78oB+uE25T8TX4Jdt6WmI

Malware Config

Targets

    • Target

      fd1749361ad145e068db8c1a8ce09584_JaffaCakes118

    • Size

      13.8MB

    • MD5

      fd1749361ad145e068db8c1a8ce09584

    • SHA1

      10de95047a4c6989ff96173e001f2354ea6c6928

    • SHA256

      3b0a9f83e9cd801602820a12312d6140601fe5a611338c13bbb1fba6939bedac

    • SHA512

      c443625ea09b870a71db8db6fec1f8143df9ca5ec65413794cf8feb2107921a12ad495bc71f0e6b5811d1ef83b9b74084530e9ffa2693c1a6a6e16e08fc25eb6

    • SSDEEP

      393216:G88o+0j6Z3eXpXYi625U9U8bvFNST/J+P3S+kgsc2oW/uOF:78oB+uE25T8TX4Jdt6WmI

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks