General

  • Target

    97cda20041b882a4c9b3518f48438571_JaffaCakes118

  • Size

    2.7MB

  • Sample

    240605-lz81pace5t

  • MD5

    97cda20041b882a4c9b3518f48438571

  • SHA1

    718e686533b4f0b748897e585a1e2a5361c1751e

  • SHA256

    3d021165ea4ba0f0b3aaeea94fba87a9db7ad7bcdaab331a0363c70fdbab35fd

  • SHA512

    08fcd4fe583cdd836354c243b912fcc3d8fa44f0d9f20c80d2a0f7ebf6af9b757d2ef83a6792078a4576cda32b2e9eddce8169510a2770bbe5f6a576c29a258e

  • SSDEEP

    49152:hRZyY3OVLl9fSnpDugpH18yNsBkhXEpp4kN46mvm38EK9IxoEdr1+FiXP9tbBNC/:hRZTKXqnhmyuOUAk6jeMRDEdr8I/9tb4

Malware Config

Targets

    • Target

      97cda20041b882a4c9b3518f48438571_JaffaCakes118

    • Size

      2.7MB

    • MD5

      97cda20041b882a4c9b3518f48438571

    • SHA1

      718e686533b4f0b748897e585a1e2a5361c1751e

    • SHA256

      3d021165ea4ba0f0b3aaeea94fba87a9db7ad7bcdaab331a0363c70fdbab35fd

    • SHA512

      08fcd4fe583cdd836354c243b912fcc3d8fa44f0d9f20c80d2a0f7ebf6af9b757d2ef83a6792078a4576cda32b2e9eddce8169510a2770bbe5f6a576c29a258e

    • SSDEEP

      49152:hRZyY3OVLl9fSnpDugpH18yNsBkhXEpp4kN46mvm38EK9IxoEdr1+FiXP9tbBNC/:hRZTKXqnhmyuOUAk6jeMRDEdr8I/9tb4

    • Checks if the Android device is rooted.

    • Queries the phone number (MSISDN for GSM devices)

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks