General

  • Target

    a4603bd6975a86ea3e8303ff1cfa69cc_JaffaCakes118

  • Size

    30.2MB

  • Sample

    240613-h3bmtashkl

  • MD5

    a4603bd6975a86ea3e8303ff1cfa69cc

  • SHA1

    ca39a254d924aa8617100bfe562e4c17e167ec36

  • SHA256

    327c01ee8fadb9e62cafb12dccda1dc3121f8765530e442706d45f955f98314c

  • SHA512

    0d79d96679870bc31c0f12ed2eb2a4ffc8ab9ecc98b71af13f8e5371c32d7b6bdadd6ba840cf52f75525b0fb8acfdc035d9cbd7f837dfd1ffe2ac2eae0e9c32d

  • SSDEEP

    786432:Ug3H1wIC7L+cMFy2duTZPoTsEIKzi32sQAyzQDXHni:n13C7L+jDulPoTsVIi3nQATC

Malware Config

Targets

    • Target

      a4603bd6975a86ea3e8303ff1cfa69cc_JaffaCakes118

    • Size

      30.2MB

    • MD5

      a4603bd6975a86ea3e8303ff1cfa69cc

    • SHA1

      ca39a254d924aa8617100bfe562e4c17e167ec36

    • SHA256

      327c01ee8fadb9e62cafb12dccda1dc3121f8765530e442706d45f955f98314c

    • SHA512

      0d79d96679870bc31c0f12ed2eb2a4ffc8ab9ecc98b71af13f8e5371c32d7b6bdadd6ba840cf52f75525b0fb8acfdc035d9cbd7f837dfd1ffe2ac2eae0e9c32d

    • SSDEEP

      786432:Ug3H1wIC7L+cMFy2duTZPoTsEIKzi32sQAyzQDXHni:n13C7L+jDulPoTsVIi3nQATC

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks