General

  • Target

    a374550974f89f158395db5cfe3e738a_JaffaCakes118

  • Size

    30.1MB

  • Sample

    240613-cb4avszfqf

  • MD5

    a374550974f89f158395db5cfe3e738a

  • SHA1

    955a10789da5a7fd011fd3c0d627b2ab14f4cd2e

  • SHA256

    90da92b7fec812a091e192832428edbbe577993f00cd7696b5d25ad7bc5bd151

  • SHA512

    e21d0d3d947f4930444dc7fa9a5b82cf342166dda68cc3d2abc270fbe1623ec970982b6cfaabae04e90834d42777e8332ca78c9abb88ae453b76abe20b4cad5a

  • SSDEEP

    786432:0IVw1rIC73eQMZ+6BOcZPA/sEI8uIRFP78qKQvMIu/:21cC73evjOWPA/s1zIR178nF

Malware Config

Targets

    • Target

      a374550974f89f158395db5cfe3e738a_JaffaCakes118

    • Size

      30.1MB

    • MD5

      a374550974f89f158395db5cfe3e738a

    • SHA1

      955a10789da5a7fd011fd3c0d627b2ab14f4cd2e

    • SHA256

      90da92b7fec812a091e192832428edbbe577993f00cd7696b5d25ad7bc5bd151

    • SHA512

      e21d0d3d947f4930444dc7fa9a5b82cf342166dda68cc3d2abc270fbe1623ec970982b6cfaabae04e90834d42777e8332ca78c9abb88ae453b76abe20b4cad5a

    • SSDEEP

      786432:0IVw1rIC73eQMZ+6BOcZPA/sEI8uIRFP78qKQvMIu/:21cC73evjOWPA/s1zIR178nF

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks