General

  • Target

    984924f7f74e34e00a2ab14e2b37e868_JaffaCakes118

  • Size

    3.4MB

  • Sample

    240605-qvlrtahe57

  • MD5

    984924f7f74e34e00a2ab14e2b37e868

  • SHA1

    9f7b9eecafb014fc63dc90865422f5e7f90dc507

  • SHA256

    9a8a19eb6b18a1aa018a8173d00f46c3ac69d053d928ac7c2cf8dd875d179432

  • SHA512

    e218709533ed1ea9fe63f96527a3fcb8773e837cf5c502ddb1d20f5716945a3dbc7b5bbaddcd490590206162cf9550208fdd0c050779592e3b2e273b6f29af0a

  • SSDEEP

    98304:dQm7rcPjG6bIb6Ya3WHcygI1Q4ZBkPRx4:dQsYi6bXk8xIYr4

Malware Config

Targets

    • Target

      984924f7f74e34e00a2ab14e2b37e868_JaffaCakes118

    • Size

      3.4MB

    • MD5

      984924f7f74e34e00a2ab14e2b37e868

    • SHA1

      9f7b9eecafb014fc63dc90865422f5e7f90dc507

    • SHA256

      9a8a19eb6b18a1aa018a8173d00f46c3ac69d053d928ac7c2cf8dd875d179432

    • SHA512

      e218709533ed1ea9fe63f96527a3fcb8773e837cf5c502ddb1d20f5716945a3dbc7b5bbaddcd490590206162cf9550208fdd0c050779592e3b2e273b6f29af0a

    • SSDEEP

      98304:dQm7rcPjG6bIb6Ya3WHcygI1Q4ZBkPRx4:dQsYi6bXk8xIYr4

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks