General

  • Target

    9b039c97f1a3e5bbe3c4700071f4ea1f_JaffaCakes118

  • Size

    25.1MB

  • Sample

    240610-rzl4tazbmd

  • MD5

    9b039c97f1a3e5bbe3c4700071f4ea1f

  • SHA1

    b91342991e8446e322c5e903b3ad6f224f19017e

  • SHA256

    401189077a68c2e612d561dbba153b90ec3b57bd59bda1f09fea7dfc3571bfb6

  • SHA512

    e5468750f4b2fe02f22bb8223d34e05bbba5951cde241e74b18fc94dbbca01da8c99de90ee9fcad2303708993cdf49d643433acf7c342908766ff3010f20c669

  • SSDEEP

    786432:JdAqFAgHpLDx2cAl37cuh6ef59mYKjh+49YLv9vVLkT7x:9Fxmlrc5IXmh+49Yr7Cx

Malware Config

Targets

    • Target

      9b039c97f1a3e5bbe3c4700071f4ea1f_JaffaCakes118

    • Size

      25.1MB

    • MD5

      9b039c97f1a3e5bbe3c4700071f4ea1f

    • SHA1

      b91342991e8446e322c5e903b3ad6f224f19017e

    • SHA256

      401189077a68c2e612d561dbba153b90ec3b57bd59bda1f09fea7dfc3571bfb6

    • SHA512

      e5468750f4b2fe02f22bb8223d34e05bbba5951cde241e74b18fc94dbbca01da8c99de90ee9fcad2303708993cdf49d643433acf7c342908766ff3010f20c669

    • SSDEEP

      786432:JdAqFAgHpLDx2cAl37cuh6ef59mYKjh+49YLv9vVLkT7x:9Fxmlrc5IXmh+49Yr7Cx

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Checks the presence of a debugger

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks