General

  • Target

    848c91e4e3f19335901a0bc08b7b10c6_JaffaCakes118

  • Size

    30.2MB

  • Sample

    241101-wdpd9svmdj

  • MD5

    848c91e4e3f19335901a0bc08b7b10c6

  • SHA1

    1fabe943ba35aec9c0b727d04b70119d334ba33a

  • SHA256

    e0249536c87734ee38126bde23ce82327bfae9b4754536411ea3d6ba58f6d00c

  • SHA512

    07c8f41aeb4478506b37dbe2219338cba0bb46402a5ab48f67d4a7f3f8f3bde2a09a5a22bd56adc75727312e03967a9be6cdb89c27b08d7aa503c6d22307a32f

  • SSDEEP

    786432:xq8Y/KeM7SJDOmDaWojmDaWwJplWZxaEwTG50NnIAw/sP1YHCpC:c/muW3f5DXEwTK0NnIb0NoV

Malware Config

Targets

    • Target

      848c91e4e3f19335901a0bc08b7b10c6_JaffaCakes118

    • Size

      30.2MB

    • MD5

      848c91e4e3f19335901a0bc08b7b10c6

    • SHA1

      1fabe943ba35aec9c0b727d04b70119d334ba33a

    • SHA256

      e0249536c87734ee38126bde23ce82327bfae9b4754536411ea3d6ba58f6d00c

    • SHA512

      07c8f41aeb4478506b37dbe2219338cba0bb46402a5ab48f67d4a7f3f8f3bde2a09a5a22bd56adc75727312e03967a9be6cdb89c27b08d7aa503c6d22307a32f

    • SSDEEP

      786432:xq8Y/KeM7SJDOmDaWojmDaWwJplWZxaEwTG50NnIAw/sP1YHCpC:c/muW3f5DXEwTK0NnIb0NoV

    • Checks Android system properties for emulator presence.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks