General

  • Target

    97e3209459890704c5118c23d78744e5_JaffaCakes118

  • Size

    30.4MB

  • Sample

    240605-mm4qwaea49

  • MD5

    97e3209459890704c5118c23d78744e5

  • SHA1

    6ad970dbf60715c53c36dff30c81000d7fff1ab8

  • SHA256

    c0b1cdb71765ce2e623eafa9b9f2d4469fe958bdf93fbfd4c1c9add3b7950270

  • SHA512

    f2dabeeb3082e3c07daa70064fb1b16b69238c486c7e71e4dc8955f282095c2aec44eb843b9e6d3c3caf8050bf36b094bf7cc71809b5e55f34dbe84fc4a689f8

  • SSDEEP

    786432:ggf/1RIC77yFMWjsFskZPQbsEoiaqj2F0wGbQPEzHH:D1SC77yS5s+PQbsBRqjW0wkz

Malware Config

Targets

    • Target

      97e3209459890704c5118c23d78744e5_JaffaCakes118

    • Size

      30.4MB

    • MD5

      97e3209459890704c5118c23d78744e5

    • SHA1

      6ad970dbf60715c53c36dff30c81000d7fff1ab8

    • SHA256

      c0b1cdb71765ce2e623eafa9b9f2d4469fe958bdf93fbfd4c1c9add3b7950270

    • SHA512

      f2dabeeb3082e3c07daa70064fb1b16b69238c486c7e71e4dc8955f282095c2aec44eb843b9e6d3c3caf8050bf36b094bf7cc71809b5e55f34dbe84fc4a689f8

    • SSDEEP

      786432:ggf/1RIC77yFMWjsFskZPQbsEoiaqj2F0wGbQPEzHH:D1SC77yS5s+PQbsBRqjW0wkz

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks