General

  • Target

    9587c56ffcba34ee870453976de7edbb_JaffaCakes118

  • Size

    13.4MB

  • Sample

    240604-tz1nbacg8t

  • MD5

    9587c56ffcba34ee870453976de7edbb

  • SHA1

    23d972174c5049341823befd3bb12f2b2446a254

  • SHA256

    76d0a699595ac7573352850185435a73d8cac8109f468d2081265d9ce7c446c4

  • SHA512

    ca980f0252a1ecf42c608f329bfa7f484140e7563078e49b6fecabbab1d547968ec8caf3e90bf69186c260d219432d75e90f84e3b0ab1c26cb997c14e29cd894

  • SSDEEP

    393216:SED703cJHlgv+UoZejQszwz7zJ+BSugpk:SL3qlgGUoXl7qgpk

Malware Config

Targets

    • Target

      9587c56ffcba34ee870453976de7edbb_JaffaCakes118

    • Size

      13.4MB

    • MD5

      9587c56ffcba34ee870453976de7edbb

    • SHA1

      23d972174c5049341823befd3bb12f2b2446a254

    • SHA256

      76d0a699595ac7573352850185435a73d8cac8109f468d2081265d9ce7c446c4

    • SHA512

      ca980f0252a1ecf42c608f329bfa7f484140e7563078e49b6fecabbab1d547968ec8caf3e90bf69186c260d219432d75e90f84e3b0ab1c26cb997c14e29cd894

    • SSDEEP

      393216:SED703cJHlgv+UoZejQszwz7zJ+BSugpk:SL3qlgGUoXl7qgpk

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks