General

  • Target

    5370c14741e781ac5f369eb5cd316939_JaffaCakes118

  • Size

    12.0MB

  • Sample

    241017-ynkj6stapd

  • MD5

    5370c14741e781ac5f369eb5cd316939

  • SHA1

    296b8840facbdc31e953088051510fd14a7f0464

  • SHA256

    6cd18f488bd299ad26874fe3fb8f78005f3e2c631e47a8954da24e607f24e79b

  • SHA512

    62410847596e866bcd606e2f7a79a190d98a2d3189b7aa2e1a234f9d5d22408460240521763acef015045b97b14886643da502b12869fe1f396ede527483aff5

  • SSDEEP

    196608:N8Wd3hFjhecEfkBeoKaVih5Bd+CRzoakM5w2LEjKNCYtUFwasixqm:H7ecRBeVNBd+YzDkIwZjdYtQwasixqm

Malware Config

Targets

    • Target

      5370c14741e781ac5f369eb5cd316939_JaffaCakes118

    • Size

      12.0MB

    • MD5

      5370c14741e781ac5f369eb5cd316939

    • SHA1

      296b8840facbdc31e953088051510fd14a7f0464

    • SHA256

      6cd18f488bd299ad26874fe3fb8f78005f3e2c631e47a8954da24e607f24e79b

    • SHA512

      62410847596e866bcd606e2f7a79a190d98a2d3189b7aa2e1a234f9d5d22408460240521763acef015045b97b14886643da502b12869fe1f396ede527483aff5

    • SSDEEP

      196608:N8Wd3hFjhecEfkBeoKaVih5Bd+CRzoakM5w2LEjKNCYtUFwasixqm:H7ecRBeVNBd+YzDkIwZjdYtQwasixqm

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks