General

  • Target

    962b402a6164ad939762d617d41d24e9_JaffaCakes118

  • Size

    3.2MB

  • Sample

    240604-zdkmvsbc96

  • MD5

    962b402a6164ad939762d617d41d24e9

  • SHA1

    6829590b2400aa72f932ae7cb61a95f688b4d2ae

  • SHA256

    dca22c64471fee28f1ee41674963224c956ae24eb60d737b5a3f8e736be83d70

  • SHA512

    56c023a57f82e989b2cb98e0928e2b25b7a6beffb70b39273922a86ae0ba509c30d4bbe7c56964bf978554e9568cb0d4b201c523b9c8ca8b246cdad35412d1c4

  • SSDEEP

    98304:F6c3HU0pfAucwQ1uBmVDNxZQoxNr3QDU8d8C:4c7pfjcZugVDfmo4fiC

Malware Config

Targets

    • Target

      962b402a6164ad939762d617d41d24e9_JaffaCakes118

    • Size

      3.2MB

    • MD5

      962b402a6164ad939762d617d41d24e9

    • SHA1

      6829590b2400aa72f932ae7cb61a95f688b4d2ae

    • SHA256

      dca22c64471fee28f1ee41674963224c956ae24eb60d737b5a3f8e736be83d70

    • SHA512

      56c023a57f82e989b2cb98e0928e2b25b7a6beffb70b39273922a86ae0ba509c30d4bbe7c56964bf978554e9568cb0d4b201c523b9c8ca8b246cdad35412d1c4

    • SSDEEP

      98304:F6c3HU0pfAucwQ1uBmVDNxZQoxNr3QDU8d8C:4c7pfjcZugVDfmo4fiC

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks