General

  • Target

    895ce02f93f6c715793b18ad07f66ad6_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240601-e3spjsae33

  • MD5

    895ce02f93f6c715793b18ad07f66ad6

  • SHA1

    1fc8ebefcc5ea5ce03ae880ab25cfcf7e1c710c6

  • SHA256

    9b2decf4631db7072c8a17e2a91aa1b49c936db91e41b2682d1b0267a2e0568a

  • SHA512

    4fa3ae6c463f15ef23d48ae1018e7eb4f23d33586bf983df62b0807e0a3b662f9bb5bf48d185f97bb03f4d51c7698f23ad4c1af31c625b8160e18f9b76233148

  • SSDEEP

    24576:gWDLa2eh5MK3hh5MK3jh5MK3Bh5MK3cPgcndd/hrNFB:ZS2eXxXzXxXHe3F

Malware Config

Targets

    • Target

      895ce02f93f6c715793b18ad07f66ad6_JaffaCakes118

    • Size

      1.2MB

    • MD5

      895ce02f93f6c715793b18ad07f66ad6

    • SHA1

      1fc8ebefcc5ea5ce03ae880ab25cfcf7e1c710c6

    • SHA256

      9b2decf4631db7072c8a17e2a91aa1b49c936db91e41b2682d1b0267a2e0568a

    • SHA512

      4fa3ae6c463f15ef23d48ae1018e7eb4f23d33586bf983df62b0807e0a3b662f9bb5bf48d185f97bb03f4d51c7698f23ad4c1af31c625b8160e18f9b76233148

    • SSDEEP

      24576:gWDLa2eh5MK3hh5MK3jh5MK3Bh5MK3cPgcndd/hrNFB:ZS2eXxXzXxXHe3F

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks