General

  • Target

    8bdc73d76f98066f0958084e176d747c_JaffaCakes118

  • Size

    698KB

  • Sample

    241103-rfj54symfq

  • MD5

    8bdc73d76f98066f0958084e176d747c

  • SHA1

    8b95d41143cca0d3c1f3a42ccf8ee93c022f26b5

  • SHA256

    8a5eaa7b90c396dc61545b6ce6cb4f9e328c27b8f3d71e4746d785bccc10c6f4

  • SHA512

    f076a0b02ac0e3234400d2ffd17e1e8cd62ddba12f97488b1ff0b8b2b372bdd2a02ea45c81dcf543d79b90500e18917751fe3d1f2c72b2808a2ddb21640c430f

  • SSDEEP

    12288:nEgc9q8zAqd9VzE24+QBQNHBphVYUgIqt0xe6AciWQOy9V2Nc6AIdGK:n9mqa7z224++QNhp/J3xe6AcLmaV

Malware Config

Targets

    • Target

      8bdc73d76f98066f0958084e176d747c_JaffaCakes118

    • Size

      698KB

    • MD5

      8bdc73d76f98066f0958084e176d747c

    • SHA1

      8b95d41143cca0d3c1f3a42ccf8ee93c022f26b5

    • SHA256

      8a5eaa7b90c396dc61545b6ce6cb4f9e328c27b8f3d71e4746d785bccc10c6f4

    • SHA512

      f076a0b02ac0e3234400d2ffd17e1e8cd62ddba12f97488b1ff0b8b2b372bdd2a02ea45c81dcf543d79b90500e18917751fe3d1f2c72b2808a2ddb21640c430f

    • SSDEEP

      12288:nEgc9q8zAqd9VzE24+QBQNHBphVYUgIqt0xe6AciWQOy9V2Nc6AIdGK:n9mqa7z224++QNhp/J3xe6AcLmaV

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks