General

  • Target

    51cfd2894e09d7ceedaa8e3aefbde033_JaffaCakes118

  • Size

    1.4MB

  • Sample

    241017-m3nplavapc

  • MD5

    51cfd2894e09d7ceedaa8e3aefbde033

  • SHA1

    73c2bbf7fc6a678e6ce8a6ad592f0de3c19bd9a3

  • SHA256

    753b778edbe52ebd0ec18236d8c5cb5867d61c17ce54451bbb8f79ca4892996a

  • SHA512

    d898c03d62e3784aee7a252c0377ebc5be2ffcceff45fa46d4a3a657e25f26cd83aa59d6bbc25f0cb23ab0ea8b962b632783479b6780d710028f05428595290d

  • SSDEEP

    24576:F+ImSCj5fYHHoBx4hpjFcSQUEuvGbO1q2UDhDumxcGadKhfdRU+2cVeFA:FHmTVYno0pjaXUEuUtDdxcZAtk12

Malware Config

Targets

    • Target

      51cfd2894e09d7ceedaa8e3aefbde033_JaffaCakes118

    • Size

      1.4MB

    • MD5

      51cfd2894e09d7ceedaa8e3aefbde033

    • SHA1

      73c2bbf7fc6a678e6ce8a6ad592f0de3c19bd9a3

    • SHA256

      753b778edbe52ebd0ec18236d8c5cb5867d61c17ce54451bbb8f79ca4892996a

    • SHA512

      d898c03d62e3784aee7a252c0377ebc5be2ffcceff45fa46d4a3a657e25f26cd83aa59d6bbc25f0cb23ab0ea8b962b632783479b6780d710028f05428595290d

    • SSDEEP

      24576:F+ImSCj5fYHHoBx4hpjFcSQUEuvGbO1q2UDhDumxcGadKhfdRU+2cVeFA:FHmTVYno0pjaXUEuUtDdxcZAtk12

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks