General

  • Target

    9a887bb63bbc4f7cbb48212e4e13693d_JaffaCakes118

  • Size

    3.4MB

  • Sample

    240610-nr36ksaa28

  • MD5

    9a887bb63bbc4f7cbb48212e4e13693d

  • SHA1

    9cf5680aed08fb352066180b423260fba7d02ab5

  • SHA256

    e588fc7c2c91448bfa9969bd01838295bd26041c0756d3048c38b1c95bf8e6ab

  • SHA512

    85dca3e5fa9a1eea74108f9932a5d638d894330e8e14108dfe422034ceefbac5175c4f09858d2769e801e0aef2c7f8f71d456448206e425eb6aed2078961752e

  • SSDEEP

    98304:9nbwpw2KMyNW2kEA+sBzh/pYJG0mU0I/OZmSFj:9nUZhuvpvOnFj

Malware Config

Targets

    • Target

      9a887bb63bbc4f7cbb48212e4e13693d_JaffaCakes118

    • Size

      3.4MB

    • MD5

      9a887bb63bbc4f7cbb48212e4e13693d

    • SHA1

      9cf5680aed08fb352066180b423260fba7d02ab5

    • SHA256

      e588fc7c2c91448bfa9969bd01838295bd26041c0756d3048c38b1c95bf8e6ab

    • SHA512

      85dca3e5fa9a1eea74108f9932a5d638d894330e8e14108dfe422034ceefbac5175c4f09858d2769e801e0aef2c7f8f71d456448206e425eb6aed2078961752e

    • SSDEEP

      98304:9nbwpw2KMyNW2kEA+sBzh/pYJG0mU0I/OZmSFj:9nUZhuvpvOnFj

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks