General

  • Target

    5237db4fc88723d8ff2ad36eca190c3a_JaffaCakes118

  • Size

    1.5MB

  • Sample

    241017-qqgbjasfpm

  • MD5

    5237db4fc88723d8ff2ad36eca190c3a

  • SHA1

    f37b5989319fab2e34a0ab348d1ec0d96efffdd9

  • SHA256

    0cfdff6fcee391b9f8c7edad51cd3c081f0cf3259966371c4e2770f3a4b51cfe

  • SHA512

    36e25e4bf5037e0291cf745df48dd4deae05402a94f599a115530ae349f6f1956995294d0c972c2bfc812c689e07af8380e7d3a507882c0cc95888a66c1d76b1

  • SSDEEP

    24576:/ZtzEQ7Blgt8k+igQF1mfqV0qAHCBKPuhk7C9vatjFt38ObVdDdw12IDIPPWYFL7:/ZJ9C+k+rQFkNiBKPu5U9Ft3/r5cIPPr

Malware Config

Targets

    • Target

      5237db4fc88723d8ff2ad36eca190c3a_JaffaCakes118

    • Size

      1.5MB

    • MD5

      5237db4fc88723d8ff2ad36eca190c3a

    • SHA1

      f37b5989319fab2e34a0ab348d1ec0d96efffdd9

    • SHA256

      0cfdff6fcee391b9f8c7edad51cd3c081f0cf3259966371c4e2770f3a4b51cfe

    • SHA512

      36e25e4bf5037e0291cf745df48dd4deae05402a94f599a115530ae349f6f1956995294d0c972c2bfc812c689e07af8380e7d3a507882c0cc95888a66c1d76b1

    • SSDEEP

      24576:/ZtzEQ7Blgt8k+igQF1mfqV0qAHCBKPuhk7C9vatjFt38ObVdDdw12IDIPPWYFL7:/ZJ9C+k+rQFkNiBKPu5U9Ft3/r5cIPPr

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks