General

  • Target

    4387861df02e917bc65d9d2151866cc3_JaffaCakes118

  • Size

    8.5MB

  • Sample

    241014-wthawssfqq

  • MD5

    4387861df02e917bc65d9d2151866cc3

  • SHA1

    ec41b8fc8807535e07b8c088489845fe3b2a0da2

  • SHA256

    3185120f2e43e86b016534fdee9eb802a6b505d60f054f46a0a90168c5b3b8e1

  • SHA512

    d406870bf6ea0fa5c12e8d029ecf3bc5077553449429d132246e9107b25ddf31603f90c037854859986e8c198e95bb59fa787a2ea5b6c8076a2d58b610358dee

  • SSDEEP

    196608:IDoTQEkaJ/5P0hr0WXGzAihAKuURgHKNRRpvufGR9ls:IDoTLP0hrxGzzYU6HvN

Malware Config

Targets

    • Target

      4387861df02e917bc65d9d2151866cc3_JaffaCakes118

    • Size

      8.5MB

    • MD5

      4387861df02e917bc65d9d2151866cc3

    • SHA1

      ec41b8fc8807535e07b8c088489845fe3b2a0da2

    • SHA256

      3185120f2e43e86b016534fdee9eb802a6b505d60f054f46a0a90168c5b3b8e1

    • SHA512

      d406870bf6ea0fa5c12e8d029ecf3bc5077553449429d132246e9107b25ddf31603f90c037854859986e8c198e95bb59fa787a2ea5b6c8076a2d58b610358dee

    • SSDEEP

      196608:IDoTQEkaJ/5P0hr0WXGzAihAKuURgHKNRRpvufGR9ls:IDoTLP0hrxGzzYU6HvN

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks