General

  • Target

    a7dfa923e8eea21b425571287bfdb194_JaffaCakes118

  • Size

    3.3MB

  • Sample

    240614-d6npbsxflq

  • MD5

    a7dfa923e8eea21b425571287bfdb194

  • SHA1

    edcbc3b92568aa243943f1bf75d6bc79aef73b01

  • SHA256

    35a6d1ed2ae94daef05c47e5643a2b2d465addc7ea7537c2427ec84090385082

  • SHA512

    16fbfde79866dc3b4fd48ac7eaebe511648a39d75a7688b033ccbd58fa6b00cbc9174589b570a95c80bdafe7762ff92209c7bd178c6db5e7798270432e288a7c

  • SSDEEP

    98304:RohWAo3eZru6tvBsYrcnfRrxgzKnUTxWohL/BH2OtywXF3oyVAoVgIR:RogneZS6BBrcnfRrxgmnQzRX

Malware Config

Targets

    • Target

      a7dfa923e8eea21b425571287bfdb194_JaffaCakes118

    • Size

      3.3MB

    • MD5

      a7dfa923e8eea21b425571287bfdb194

    • SHA1

      edcbc3b92568aa243943f1bf75d6bc79aef73b01

    • SHA256

      35a6d1ed2ae94daef05c47e5643a2b2d465addc7ea7537c2427ec84090385082

    • SHA512

      16fbfde79866dc3b4fd48ac7eaebe511648a39d75a7688b033ccbd58fa6b00cbc9174589b570a95c80bdafe7762ff92209c7bd178c6db5e7798270432e288a7c

    • SSDEEP

      98304:RohWAo3eZru6tvBsYrcnfRrxgzKnUTxWohL/BH2OtywXF3oyVAoVgIR:RogneZS6BBrcnfRrxgmnQzRX

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks