General

  • Target

    989a73bcb31834ff7f7c8c6c4d8d777e_JaffaCakes118

  • Size

    5.4MB

  • Sample

    240605-tqmp4ace75

  • MD5

    989a73bcb31834ff7f7c8c6c4d8d777e

  • SHA1

    5a3e33fa1e95d238d691199836c486824ece630b

  • SHA256

    25bd204c49eea67a0d2547548ad8ad90066a37d8c59feac85659c39b960e1a47

  • SHA512

    8d64d37f5dd3e2eab6eda2e0f30bb04a83c78e58cf09b0169630d97c6316032de4c811b81c25647e01afa140021e0bbf0f901aa1047d6640b9eed4aaf4e927ec

  • SSDEEP

    98304:6tEk1LyGRHGCT9WMb14Dd/135P1CsqPylSSLzNt0GI7pVJtEQ/77F6max+X51O:6tEk1mGdGsb14DjpQXq4pVJ6Y7MmawO

Malware Config

Targets

    • Target

      989a73bcb31834ff7f7c8c6c4d8d777e_JaffaCakes118

    • Size

      5.4MB

    • MD5

      989a73bcb31834ff7f7c8c6c4d8d777e

    • SHA1

      5a3e33fa1e95d238d691199836c486824ece630b

    • SHA256

      25bd204c49eea67a0d2547548ad8ad90066a37d8c59feac85659c39b960e1a47

    • SHA512

      8d64d37f5dd3e2eab6eda2e0f30bb04a83c78e58cf09b0169630d97c6316032de4c811b81c25647e01afa140021e0bbf0f901aa1047d6640b9eed4aaf4e927ec

    • SSDEEP

      98304:6tEk1LyGRHGCT9WMb14Dd/135P1CsqPylSSLzNt0GI7pVJtEQ/77F6max+X51O:6tEk1mGdGsb14DjpQXq4pVJ6Y7MmawO

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks