General

  • Target

    96fad71c238431b987542105e3e18328_JaffaCakes118

  • Size

    15.1MB

  • Sample

    240605-cmaspabc7s

  • MD5

    96fad71c238431b987542105e3e18328

  • SHA1

    cccf995cf40064f0f7ee10af45452f925feb9547

  • SHA256

    ffaaad4a8b9b5e94f940bc3ecf1f89eacf46cc31c42070a28b7f3d779a99e6ef

  • SHA512

    2b58fcffdb787f73971f0cbedb877f5bd876ed202d25f4671d5fc07afb986c2899894bda44eafd24094f01406676f1653fb81241fe53315cb2062499ed5f20af

  • SSDEEP

    393216:heUCVzw0805YwgSfZ7R6jyh74tHJpuxsM6gIKD:heVT75YwgwZrqYj

Malware Config

Targets

    • Target

      96fad71c238431b987542105e3e18328_JaffaCakes118

    • Size

      15.1MB

    • MD5

      96fad71c238431b987542105e3e18328

    • SHA1

      cccf995cf40064f0f7ee10af45452f925feb9547

    • SHA256

      ffaaad4a8b9b5e94f940bc3ecf1f89eacf46cc31c42070a28b7f3d779a99e6ef

    • SHA512

      2b58fcffdb787f73971f0cbedb877f5bd876ed202d25f4671d5fc07afb986c2899894bda44eafd24094f01406676f1653fb81241fe53315cb2062499ed5f20af

    • SSDEEP

      393216:heUCVzw0805YwgSfZ7R6jyh74tHJpuxsM6gIKD:heVT75YwgwZrqYj

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks