General

  • Target

    9c46c636c7c8c1bb78f5abd7ee7aa0f4_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240610-3bg1qsvcmd

  • MD5

    9c46c636c7c8c1bb78f5abd7ee7aa0f4

  • SHA1

    166728ae1c814d6f1d161f9c6607331760477645

  • SHA256

    e830df4a2e4133ca7144fa7b57aef9d56e57a5c5b8a28b17ad5965478771663a

  • SHA512

    5f75da82ee7fcd7e84b8c907231785ee2ef3b688e4f4551af782e6e25bf82f25bb01994e38210950369459073da2a320cdfb7d520953cfeb89f16c5fdb526974

  • SSDEEP

    49152:giOUYetdQf9M4nYp0qfbmXgAAHY4Cpze+bzxAv0F+VNkIsbhZuZv/eSxEkM:g/Mt+f9M4nYp5zDAaY4Cpa+bzuv0wVNO

Malware Config

Targets

    • Target

      9c46c636c7c8c1bb78f5abd7ee7aa0f4_JaffaCakes118

    • Size

      2.6MB

    • MD5

      9c46c636c7c8c1bb78f5abd7ee7aa0f4

    • SHA1

      166728ae1c814d6f1d161f9c6607331760477645

    • SHA256

      e830df4a2e4133ca7144fa7b57aef9d56e57a5c5b8a28b17ad5965478771663a

    • SHA512

      5f75da82ee7fcd7e84b8c907231785ee2ef3b688e4f4551af782e6e25bf82f25bb01994e38210950369459073da2a320cdfb7d520953cfeb89f16c5fdb526974

    • SSDEEP

      49152:giOUYetdQf9M4nYp0qfbmXgAAHY4Cpze+bzxAv0F+VNkIsbhZuZv/eSxEkM:g/Mt+f9M4nYp5zDAaY4Cpa+bzuv0wVNO

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks