General

  • Target

    11564068e0104f7b4f9b17ac6c9cc295_JaffaCakes118

  • Size

    6.2MB

  • Sample

    241004-b9r5tasama

  • MD5

    11564068e0104f7b4f9b17ac6c9cc295

  • SHA1

    949e18b06f230867e9aa34e4738c6f47901f1038

  • SHA256

    9850e03b7c99c4927e8b9d26a7c80e3afdbce6c7dfa3d24c7b14fa70d23ef880

  • SHA512

    d16eb91349f95639b9a172779354349e7476c66a82a134f610e88e51eb962c9002ba26455c5c6ea08d8c1ad30345402705642f1c9da9a4b45ea0feab8dbcfbec

  • SSDEEP

    98304:xF0jyf79tNMtKZU2MviNrRw4ukxT5p04ASEap77Ccksld3YVLCCzk6ZWNO6XuykT:Jf6K9MqdRw0TsRSE0DkM30COhWokU7

Malware Config

Targets

    • Target

      11564068e0104f7b4f9b17ac6c9cc295_JaffaCakes118

    • Size

      6.2MB

    • MD5

      11564068e0104f7b4f9b17ac6c9cc295

    • SHA1

      949e18b06f230867e9aa34e4738c6f47901f1038

    • SHA256

      9850e03b7c99c4927e8b9d26a7c80e3afdbce6c7dfa3d24c7b14fa70d23ef880

    • SHA512

      d16eb91349f95639b9a172779354349e7476c66a82a134f610e88e51eb962c9002ba26455c5c6ea08d8c1ad30345402705642f1c9da9a4b45ea0feab8dbcfbec

    • SSDEEP

      98304:xF0jyf79tNMtKZU2MviNrRw4ukxT5p04ASEap77Ccksld3YVLCCzk6ZWNO6XuykT:Jf6K9MqdRw0TsRSE0DkM30COhWokU7

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks