General

  • Target

    9828bb65f45a5ca4cb27300bb3ee3f80_JaffaCakes118

  • Size

    23.1MB

  • Sample

    240605-pm4rzsfd3w

  • MD5

    9828bb65f45a5ca4cb27300bb3ee3f80

  • SHA1

    28804ef7fb300463346924e14f28ce9433e527ae

  • SHA256

    44927dd335ad3870aff7fc41d67a6fdfd91990e5597ee37ed0d6183187eb4506

  • SHA512

    4267f735356940267bf9a522414a02d13de0ce6870f5954828520e454e0087dec9135a8065ad1dded18d4d68796960dad78a47fd6a1ec93a228959ba695a3cfa

  • SSDEEP

    393216:KgPmFTkTmGYclBdyqXSKBHtvI5ofc30MdFmYlRf9hEqzu07U8vB4I3ojyR5vGyec:/PWTkTzvdyqdXvIOlumqRfkA/vBB32yt

Malware Config

Targets

    • Target

      9828bb65f45a5ca4cb27300bb3ee3f80_JaffaCakes118

    • Size

      23.1MB

    • MD5

      9828bb65f45a5ca4cb27300bb3ee3f80

    • SHA1

      28804ef7fb300463346924e14f28ce9433e527ae

    • SHA256

      44927dd335ad3870aff7fc41d67a6fdfd91990e5597ee37ed0d6183187eb4506

    • SHA512

      4267f735356940267bf9a522414a02d13de0ce6870f5954828520e454e0087dec9135a8065ad1dded18d4d68796960dad78a47fd6a1ec93a228959ba695a3cfa

    • SSDEEP

      393216:KgPmFTkTmGYclBdyqXSKBHtvI5ofc30MdFmYlRf9hEqzu07U8vB4I3ojyR5vGyec:/PWTkTzvdyqdXvIOlumqRfkA/vBB32yt

    • Checks if the Android device is rooted.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks