General

  • Target

    964b4da77b3a56af9d3b8fea61eb9b6e_JaffaCakes118

  • Size

    17.6MB

  • Sample

    240604-z5zk4abg5v

  • MD5

    964b4da77b3a56af9d3b8fea61eb9b6e

  • SHA1

    588691b439fd6397d4a6418c9e4381e237dc72b2

  • SHA256

    767cec9e560c0c903460b38ca89c1b1e731e6c87c82ef941faef3e4218fb7c5e

  • SHA512

    0a30bec68f6800562869b9721ef11a2f2ad5ca0713ca17e09b5f48a767ca8c782c4162a3872c4b8506508272673e6cf41fd7f78c2b9ec41212f69181d2c31a5b

  • SSDEEP

    393216:AQB5T3XE/xR4KdqermbZzvbVBfUgXkwnNr7Om3:AQBx3XE/x5dqVjxP7Om3

Malware Config

Targets

    • Target

      964b4da77b3a56af9d3b8fea61eb9b6e_JaffaCakes118

    • Size

      17.6MB

    • MD5

      964b4da77b3a56af9d3b8fea61eb9b6e

    • SHA1

      588691b439fd6397d4a6418c9e4381e237dc72b2

    • SHA256

      767cec9e560c0c903460b38ca89c1b1e731e6c87c82ef941faef3e4218fb7c5e

    • SHA512

      0a30bec68f6800562869b9721ef11a2f2ad5ca0713ca17e09b5f48a767ca8c782c4162a3872c4b8506508272673e6cf41fd7f78c2b9ec41212f69181d2c31a5b

    • SSDEEP

      393216:AQB5T3XE/xR4KdqermbZzvbVBfUgXkwnNr7Om3:AQBx3XE/x5dqVjxP7Om3

    • Checks if the Android device is rooted.

    • Checks Android system properties for emulator presence.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks