General

  • Target

    a441e148c81d95e204a15fa91e790029_JaffaCakes118

  • Size

    19.7MB

  • Sample

    240613-hg4rgasbmq

  • MD5

    a441e148c81d95e204a15fa91e790029

  • SHA1

    86f31bb4f96156113a1127956ec5b90fc53b6d74

  • SHA256

    bf33af38148ab44578ee5d99f75dbc0d7b47dedbae6cf798c6a58347196e8ae9

  • SHA512

    e0ffee8abc5e21b8cec1756737ad1a11d0c00cc8071eda139ac8d87c5e68d3368c7c917b2c5dd17b19620921851b4b00ac1ce960f6eb6ace068afdba880da5b8

  • SSDEEP

    393216:ZRTVPtAfregyJV2UIhRw+u9QV8UHVcTWOG6l5LXjl4JzlVGRAMDdDUP2Pj:ZlVPWegaVl4yJ9QOjKOrDqxkVDdNPj

Malware Config

Targets

    • Target

      a441e148c81d95e204a15fa91e790029_JaffaCakes118

    • Size

      19.7MB

    • MD5

      a441e148c81d95e204a15fa91e790029

    • SHA1

      86f31bb4f96156113a1127956ec5b90fc53b6d74

    • SHA256

      bf33af38148ab44578ee5d99f75dbc0d7b47dedbae6cf798c6a58347196e8ae9

    • SHA512

      e0ffee8abc5e21b8cec1756737ad1a11d0c00cc8071eda139ac8d87c5e68d3368c7c917b2c5dd17b19620921851b4b00ac1ce960f6eb6ace068afdba880da5b8

    • SSDEEP

      393216:ZRTVPtAfregyJV2UIhRw+u9QV8UHVcTWOG6l5LXjl4JzlVGRAMDdDUP2Pj:ZlVPWegaVl4yJ9QOjKOrDqxkVDdNPj

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

MITRE ATT&CK Matrix

Tasks