General

  • Target

    30fa04fd1ae4504f0eb812f2f56bd0e3_JaffaCakes118

  • Size

    1.5MB

  • Sample

    241010-vkac9asakq

  • MD5

    30fa04fd1ae4504f0eb812f2f56bd0e3

  • SHA1

    7773fd1fbba1043a13c3fa9a48612676788f7bd7

  • SHA256

    cd05f2f35bd0bea1239023dbef23aa9a42710ee66182cc289c95392215d2f014

  • SHA512

    0e1dcc71383cc7ec6bed61d73131d10b6099f1c15f10068e4f4e1b3360f5fb5f760ea332c077cd94a2473e3160fae6c06afe4adf19e183f0d3701cfbc7c607f8

  • SSDEEP

    24576:PfafHW34tckcti9be4VsAeWxx9+N9hLGuQVqgNY3Q6T+tHGgY0bk1ZfvUXbk1ZfZ:EHWIhKchs+xxm9hy1VDaZT0Bk1erk1eU

Malware Config

Targets

    • Target

      30fa04fd1ae4504f0eb812f2f56bd0e3_JaffaCakes118

    • Size

      1.5MB

    • MD5

      30fa04fd1ae4504f0eb812f2f56bd0e3

    • SHA1

      7773fd1fbba1043a13c3fa9a48612676788f7bd7

    • SHA256

      cd05f2f35bd0bea1239023dbef23aa9a42710ee66182cc289c95392215d2f014

    • SHA512

      0e1dcc71383cc7ec6bed61d73131d10b6099f1c15f10068e4f4e1b3360f5fb5f760ea332c077cd94a2473e3160fae6c06afe4adf19e183f0d3701cfbc7c607f8

    • SSDEEP

      24576:PfafHW34tckcti9be4VsAeWxx9+N9hLGuQVqgNY3Q6T+tHGgY0bk1ZfvUXbk1ZfZ:EHWIhKchs+xxm9hy1VDaZT0Bk1erk1eU

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks