General

  • Target

    996600aea5fc1d3cfad850e316f94f61_JaffaCakes118

  • Size

    5.9MB

  • Sample

    240605-2b3rrsbf55

  • MD5

    996600aea5fc1d3cfad850e316f94f61

  • SHA1

    301dddd184332038dd576d22812a311b24e4d176

  • SHA256

    c436116c9b63272f89f507bc160c5d8b390152349074b156025812695847ddc7

  • SHA512

    181632357ca55b3a27b5e9cb343f1eaaa2338760a533e7275fa121043d1e85cd02c422c0fbde2386fc465c5543502e0bd270d54756c11887dddab1924f201858

  • SSDEEP

    98304:wTOyyvBDRGeZW+uY3frV8EnLC1OFAhEQ0XDaP0EFImD08ayOuEK3iV6KmYxzCGn:ctyvBDRGe030NCJhiXD7EFH08CuEKm2+

Malware Config

Targets

    • Target

      996600aea5fc1d3cfad850e316f94f61_JaffaCakes118

    • Size

      5.9MB

    • MD5

      996600aea5fc1d3cfad850e316f94f61

    • SHA1

      301dddd184332038dd576d22812a311b24e4d176

    • SHA256

      c436116c9b63272f89f507bc160c5d8b390152349074b156025812695847ddc7

    • SHA512

      181632357ca55b3a27b5e9cb343f1eaaa2338760a533e7275fa121043d1e85cd02c422c0fbde2386fc465c5543502e0bd270d54756c11887dddab1924f201858

    • SSDEEP

      98304:wTOyyvBDRGeZW+uY3frV8EnLC1OFAhEQ0XDaP0EFImD08ayOuEK3iV6KmYxzCGn:ctyvBDRGe030NCJhiXD7EFH08CuEKm2+

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks