General

  • Target

    95490942b1eac0c3fdaeddaa12f87847_JaffaCakes118

  • Size

    5.9MB

  • Sample

    240604-seckbabe63

  • MD5

    95490942b1eac0c3fdaeddaa12f87847

  • SHA1

    f0af63179dc736df5ef92119255a36fd0b8a3044

  • SHA256

    744d06ef1fcf8025aebf5590ad99d106ce1cca13e504ee82407d37f6b8622288

  • SHA512

    3f319f1e69f6475b2e47fab8505a866b34abe3f9d6e558738877f07c69d1cafb876c6ded223d3c541b44bc13441619d9f8d016b8f7524f4dd49c0b5264bd261a

  • SSDEEP

    98304:XHQljvUKULoYgMmTRavh0nsudJ6VMyq0QBa9uqArf0iLhZ601mT6PPO:XHQlDU8dcKPMU0QQgz/6003

Malware Config

Targets

    • Target

      95490942b1eac0c3fdaeddaa12f87847_JaffaCakes118

    • Size

      5.9MB

    • MD5

      95490942b1eac0c3fdaeddaa12f87847

    • SHA1

      f0af63179dc736df5ef92119255a36fd0b8a3044

    • SHA256

      744d06ef1fcf8025aebf5590ad99d106ce1cca13e504ee82407d37f6b8622288

    • SHA512

      3f319f1e69f6475b2e47fab8505a866b34abe3f9d6e558738877f07c69d1cafb876c6ded223d3c541b44bc13441619d9f8d016b8f7524f4dd49c0b5264bd261a

    • SSDEEP

      98304:XHQljvUKULoYgMmTRavh0nsudJ6VMyq0QBa9uqArf0iLhZ601mT6PPO:XHQlDU8dcKPMU0QQgz/6003

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks