General

  • Target

    6fdd470162ee8a8bd758c9463a5d8312_JaffaCakes118

  • Size

    8.3MB

  • Sample

    241023-ty4zca1hrp

  • MD5

    6fdd470162ee8a8bd758c9463a5d8312

  • SHA1

    1c5a76154367a3e7f98b87b226d8998c029a3c1a

  • SHA256

    71236fc0d777528bb2d58e7012f92b56956ff585a2dad60232774c4916df511e

  • SHA512

    cf3c4ead0123a48d5f33b0acb8f8c037813be9e2cadaf303fb97f885af37776bf05c06faa31680f28a0366c5beee13b8cfde7c300e36d0f80d6bd3cb55f586ca

  • SSDEEP

    196608:GEv5z0yNDqlTulA6cIV1/053C147WrVxwY4/if2uOn39YN9Kg:LtLFlA6V305yUQqFiO3nY

Malware Config

Targets

    • Target

      6fdd470162ee8a8bd758c9463a5d8312_JaffaCakes118

    • Size

      8.3MB

    • MD5

      6fdd470162ee8a8bd758c9463a5d8312

    • SHA1

      1c5a76154367a3e7f98b87b226d8998c029a3c1a

    • SHA256

      71236fc0d777528bb2d58e7012f92b56956ff585a2dad60232774c4916df511e

    • SHA512

      cf3c4ead0123a48d5f33b0acb8f8c037813be9e2cadaf303fb97f885af37776bf05c06faa31680f28a0366c5beee13b8cfde7c300e36d0f80d6bd3cb55f586ca

    • SSDEEP

      196608:GEv5z0yNDqlTulA6cIV1/053C147WrVxwY4/if2uOn39YN9Kg:LtLFlA6V305yUQqFiO3nY

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks