General

  • Target

    51e13d3318bb63af3fcfb27e237729c2_JaffaCakes118

  • Size

    1.3MB

  • Sample

    241017-njv51aydqk

  • MD5

    51e13d3318bb63af3fcfb27e237729c2

  • SHA1

    efddefc2b02dadaa2e92da69cb369cb42bb5db13

  • SHA256

    9b39bf8ca9f21d3c9c51c00895ace6842daa84c18d660a57d6cff16c5e447d2d

  • SHA512

    6fa4efbf2e0fe04e3b7a5b4056e82cdb643243b78c4434846f34a4fb5ce3a1c278d8d989642953a357eeb0c929a9edcbd7f73dce04bf36c9bb842a68f4923541

  • SSDEEP

    24576:tYU7XqVgGr/k6y7YeXog0Ynw6e2OtYxT94wT0PHVof8Rlxp2:tYUbHApy73YpNIOtYX4C0jPg

Malware Config

Targets

    • Target

      51e13d3318bb63af3fcfb27e237729c2_JaffaCakes118

    • Size

      1.3MB

    • MD5

      51e13d3318bb63af3fcfb27e237729c2

    • SHA1

      efddefc2b02dadaa2e92da69cb369cb42bb5db13

    • SHA256

      9b39bf8ca9f21d3c9c51c00895ace6842daa84c18d660a57d6cff16c5e447d2d

    • SHA512

      6fa4efbf2e0fe04e3b7a5b4056e82cdb643243b78c4434846f34a4fb5ce3a1c278d8d989642953a357eeb0c929a9edcbd7f73dce04bf36c9bb842a68f4923541

    • SSDEEP

      24576:tYU7XqVgGr/k6y7YeXog0Ynw6e2OtYxT94wT0PHVof8Rlxp2:tYUbHApy73YpNIOtYX4C0jPg

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks