General

  • Target

    6fe2b92defcb570de6b937014cabcc05_JaffaCakes118

  • Size

    4.7MB

  • Sample

    241023-t22cmasbmq

  • MD5

    6fe2b92defcb570de6b937014cabcc05

  • SHA1

    63912f76869f39f43af2b5fea2b6e9274e81c254

  • SHA256

    c26bfe2baa1c5e585583e38ff3017709b6f677aa2be3b65bce0dbde2a6c7e65e

  • SHA512

    3c337248084bf37cd7ce7b241fc504161935226794ba0b630136abdc16b38a5ee57de5659913633cc5f3a93c95b5404ea36621e763368ebabfdfd95c6de6c6db

  • SSDEEP

    98304:3IIWB8QMpkdHxQfas+AY33FBINqp1pD5U0/s6hMa8D43rQC/jZPe/Dg2BCUnN5kK:YyJpgmfoB31i81r5VPMhkorkNg

Malware Config

Targets

    • Target

      6fe2b92defcb570de6b937014cabcc05_JaffaCakes118

    • Size

      4.7MB

    • MD5

      6fe2b92defcb570de6b937014cabcc05

    • SHA1

      63912f76869f39f43af2b5fea2b6e9274e81c254

    • SHA256

      c26bfe2baa1c5e585583e38ff3017709b6f677aa2be3b65bce0dbde2a6c7e65e

    • SHA512

      3c337248084bf37cd7ce7b241fc504161935226794ba0b630136abdc16b38a5ee57de5659913633cc5f3a93c95b5404ea36621e763368ebabfdfd95c6de6c6db

    • SSDEEP

      98304:3IIWB8QMpkdHxQfas+AY33FBINqp1pD5U0/s6hMa8D43rQC/jZPe/Dg2BCUnN5kK:YyJpgmfoB31i81r5VPMhkorkNg

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks