General

  • Target

    9fa43fd208db904f12d5026d4b748c0c_JaffaCakes118

  • Size

    16.4MB

  • Sample

    240611-1n33mashql

  • MD5

    9fa43fd208db904f12d5026d4b748c0c

  • SHA1

    b3df0451225dbd1e048919a99a16f44b56095434

  • SHA256

    7b6be6b7aa437aab2814a34f8a680b83f316f93d533d6ba504d03f3aa43d01cc

  • SHA512

    e2e2b7a5df687388e9e873d17a9df1bc70142b915e8c288e2b8d6f91f77ac3f2313265ac7dfb259b1c4f8eafa7ce2f634234aaa117df085b08148cd72fbd4017

  • SSDEEP

    393216:R7rv7ESFC3vBp4U3it1cmE9dl2uFPV2TTVPEgkbQUhM0mDdp7XrWtsvHPMWAd3:R3v7EOQT81cnPTFPQV8gwQeLQPMWAZ

Malware Config

Targets

    • Target

      9fa43fd208db904f12d5026d4b748c0c_JaffaCakes118

    • Size

      16.4MB

    • MD5

      9fa43fd208db904f12d5026d4b748c0c

    • SHA1

      b3df0451225dbd1e048919a99a16f44b56095434

    • SHA256

      7b6be6b7aa437aab2814a34f8a680b83f316f93d533d6ba504d03f3aa43d01cc

    • SHA512

      e2e2b7a5df687388e9e873d17a9df1bc70142b915e8c288e2b8d6f91f77ac3f2313265ac7dfb259b1c4f8eafa7ce2f634234aaa117df085b08148cd72fbd4017

    • SSDEEP

      393216:R7rv7ESFC3vBp4U3it1cmE9dl2uFPV2TTVPEgkbQUhM0mDdp7XrWtsvHPMWAd3:R3v7EOQT81cnPTFPQV8gwQeLQPMWAZ

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks