General

  • Target

    a382211e61779345c915a7a2bc050508_JaffaCakes118

  • Size

    13.2MB

  • Sample

    240613-cpe57avbkp

  • MD5

    a382211e61779345c915a7a2bc050508

  • SHA1

    d17c6cf486d8205fc2f6c1b033964a0de5ccc8dd

  • SHA256

    e3a6b6fd2901ca871c5ce374acfba477996478345151a18c0565e591c715c873

  • SHA512

    90a1221da13d768669aac70299c8bacae473475f0fad338dcef2e854ccb3a2a1d6fb840a265096136fac720e201272f4a575e60283dec573e4e08e6bd46ecc5a

  • SSDEEP

    393216:p4YKYU3nrGWIgEqP/vkslv77ewWwVcvahEJnK/VmeLV:vo7Me/vkxYnEFK/VHLV

Malware Config

Targets

    • Target

      a382211e61779345c915a7a2bc050508_JaffaCakes118

    • Size

      13.2MB

    • MD5

      a382211e61779345c915a7a2bc050508

    • SHA1

      d17c6cf486d8205fc2f6c1b033964a0de5ccc8dd

    • SHA256

      e3a6b6fd2901ca871c5ce374acfba477996478345151a18c0565e591c715c873

    • SHA512

      90a1221da13d768669aac70299c8bacae473475f0fad338dcef2e854ccb3a2a1d6fb840a265096136fac720e201272f4a575e60283dec573e4e08e6bd46ecc5a

    • SSDEEP

      393216:p4YKYU3nrGWIgEqP/vkslv77ewWwVcvahEJnK/VmeLV:vo7Me/vkxYnEFK/VHLV

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks