General

  • Target

    153da25c4b07c0dbaebed3fa601c9359_JaffaCakes118

  • Size

    17.7MB

  • Sample

    241004-21dh6swapd

  • MD5

    153da25c4b07c0dbaebed3fa601c9359

  • SHA1

    9de26251ce4e4232642c8b4f2c41ac67cceaae9c

  • SHA256

    317c276c78024e063c00fd19ecb15c282680136a20c3ec1a7f822095db7f7924

  • SHA512

    a05f5234e56c35eb41ba78cee2b4960b2622a49700bef330f4dba8d682245603a58b9d05047965c5a0c3611f002ab28eaac87c583bfa6dc27960f5f9c98ea8af

  • SSDEEP

    393216:p0MsZb6Pq0aNrKhL0J0O9SdLjoVFYVkSoevrlrSY8nhw:p0l9KqVrKhL0J0O9o8VFY4sr/B

Malware Config

Targets

    • Target

      153da25c4b07c0dbaebed3fa601c9359_JaffaCakes118

    • Size

      17.7MB

    • MD5

      153da25c4b07c0dbaebed3fa601c9359

    • SHA1

      9de26251ce4e4232642c8b4f2c41ac67cceaae9c

    • SHA256

      317c276c78024e063c00fd19ecb15c282680136a20c3ec1a7f822095db7f7924

    • SHA512

      a05f5234e56c35eb41ba78cee2b4960b2622a49700bef330f4dba8d682245603a58b9d05047965c5a0c3611f002ab28eaac87c583bfa6dc27960f5f9c98ea8af

    • SSDEEP

      393216:p0MsZb6Pq0aNrKhL0J0O9SdLjoVFYVkSoevrlrSY8nhw:p0l9KqVrKhL0J0O9o8VFY4sr/B

    • Checks if the Android device is rooted.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks