General

  • Target

    986be13c0603426fc4de30e6e56a9cc4_JaffaCakes118

  • Size

    3.3MB

  • Sample

    240605-rzw9sahh4v

  • MD5

    986be13c0603426fc4de30e6e56a9cc4

  • SHA1

    1b21b80d36dc103a7393ced5dee41a1d66fd9d5c

  • SHA256

    472a9ce28dbc5ca0ec512e8105d7be707885a94d0e7854a16980c72bcc319798

  • SHA512

    a1df3b856fad39745863b409959fe02501f29c5905205c9a304bd272db338cdd7014e83b2c7d283df1561183e5bc71c438ece08139c14a7a5a4d604e06c41b7f

  • SSDEEP

    98304:SsT2L2LQChWe2XPTnszLBzE1TpYpf9zygnHTfup8OtywXL3yyczIHK:SsTo2LQChz4szLBzEBpYpFzfrv

Malware Config

Targets

    • Target

      986be13c0603426fc4de30e6e56a9cc4_JaffaCakes118

    • Size

      3.3MB

    • MD5

      986be13c0603426fc4de30e6e56a9cc4

    • SHA1

      1b21b80d36dc103a7393ced5dee41a1d66fd9d5c

    • SHA256

      472a9ce28dbc5ca0ec512e8105d7be707885a94d0e7854a16980c72bcc319798

    • SHA512

      a1df3b856fad39745863b409959fe02501f29c5905205c9a304bd272db338cdd7014e83b2c7d283df1561183e5bc71c438ece08139c14a7a5a4d604e06c41b7f

    • SSDEEP

      98304:SsT2L2LQChWe2XPTnszLBzE1TpYpf9zygnHTfup8OtywXL3yyczIHK:SsTo2LQChz4szLBzEBpYpFzfrv

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks