General

  • Target

    a69049619988d9771ef07c24acdce15d_JaffaCakes118

  • Size

    30.2MB

  • Sample

    240613-t83t2awhmd

  • MD5

    a69049619988d9771ef07c24acdce15d

  • SHA1

    5b76c0607f1d7aa36b7ca16fd0595131e60e9ec8

  • SHA256

    fd9236344f31ac19dcd7a9b7a70f915045cbfbd7195442de71d9632b4337e125

  • SHA512

    84a2b0597ba361d5a82e5e87fdd0557b1288ab99cf1124138938dcccfb2eed519807b00b6b20b7d44a5eb7bf0f4b5b5da9de0ec1eae95ce6f40fdd30b39b4ddc

  • SSDEEP

    786432:3vgvi1cIC7/KyMT06BGiZPWpsEASuqDphJoCwQzEyUe:331TC7/KJ7GAPWpshFqDfJoJY

Malware Config

Targets

    • Target

      a69049619988d9771ef07c24acdce15d_JaffaCakes118

    • Size

      30.2MB

    • MD5

      a69049619988d9771ef07c24acdce15d

    • SHA1

      5b76c0607f1d7aa36b7ca16fd0595131e60e9ec8

    • SHA256

      fd9236344f31ac19dcd7a9b7a70f915045cbfbd7195442de71d9632b4337e125

    • SHA512

      84a2b0597ba361d5a82e5e87fdd0557b1288ab99cf1124138938dcccfb2eed519807b00b6b20b7d44a5eb7bf0f4b5b5da9de0ec1eae95ce6f40fdd30b39b4ddc

    • SSDEEP

      786432:3vgvi1cIC7/KyMT06BGiZPWpsEASuqDphJoCwQzEyUe:331TC7/KJ7GAPWpshFqDfJoJY

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks