General

  • Target

    9b0edac3ec8f8efc184a7ee10c30fab8_JaffaCakes118

  • Size

    30.4MB

  • Sample

    240610-r789ba1aqp

  • MD5

    9b0edac3ec8f8efc184a7ee10c30fab8

  • SHA1

    d1fd45bc872d5a95f864c6b1afbc2f07ac1be54d

  • SHA256

    e301dc8652d3303efb38baf37e78a2638af788baf68891102d906d648eedfb8e

  • SHA512

    ddfffac452df5a5564d4e0b6535a85f4014d44db2e04ce1bec2f9aaed2b10b503bcc4baea422a190c342375a0c823411673ee9fd13777e6946d7554ca9ca586b

  • SSDEEP

    786432:0MRB1pIC7XK/Mj9gxAqZPnTsEGpLxQq/mUOFQHZZt+:71aC7XKEEAoPnTsrBxQcmUTm

Malware Config

Targets

    • Target

      9b0edac3ec8f8efc184a7ee10c30fab8_JaffaCakes118

    • Size

      30.4MB

    • MD5

      9b0edac3ec8f8efc184a7ee10c30fab8

    • SHA1

      d1fd45bc872d5a95f864c6b1afbc2f07ac1be54d

    • SHA256

      e301dc8652d3303efb38baf37e78a2638af788baf68891102d906d648eedfb8e

    • SHA512

      ddfffac452df5a5564d4e0b6535a85f4014d44db2e04ce1bec2f9aaed2b10b503bcc4baea422a190c342375a0c823411673ee9fd13777e6946d7554ca9ca586b

    • SSDEEP

      786432:0MRB1pIC7XK/Mj9gxAqZPnTsEGpLxQq/mUOFQHZZt+:71aC7XKEEAoPnTsrBxQcmUTm

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks