General

  • Target

    a9abdde7ea309744f7523f0aeb00e3c0_JaffaCakes118

  • Size

    9.2MB

  • Sample

    240614-pmzg9s1ana

  • MD5

    a9abdde7ea309744f7523f0aeb00e3c0

  • SHA1

    48526d8a8973430441b15611282c908516dfdc4b

  • SHA256

    8e7dbeab25d1890adc462a1397d06c07f14c22a3544670076a9d5c2e8f7a5083

  • SHA512

    74e5923142847c5ba320f09557a42d28364537f54cf3c5f00e312a50cba17ca7e3db99bdf8f084736f8baf2e5fed1c4d05981d35f3fcc919b1628a5bb4417c26

  • SSDEEP

    196608:LrYpd/Cg+SK+b50OBMXxNMaKJag8XGcaa432TXQvyp2nQKZ2/GdC7:LEpxCC37BSxGaEeG1a4m+912O87

Malware Config

Targets

    • Target

      a9abdde7ea309744f7523f0aeb00e3c0_JaffaCakes118

    • Size

      9.2MB

    • MD5

      a9abdde7ea309744f7523f0aeb00e3c0

    • SHA1

      48526d8a8973430441b15611282c908516dfdc4b

    • SHA256

      8e7dbeab25d1890adc462a1397d06c07f14c22a3544670076a9d5c2e8f7a5083

    • SHA512

      74e5923142847c5ba320f09557a42d28364537f54cf3c5f00e312a50cba17ca7e3db99bdf8f084736f8baf2e5fed1c4d05981d35f3fcc919b1628a5bb4417c26

    • SSDEEP

      196608:LrYpd/Cg+SK+b50OBMXxNMaKJag8XGcaa432TXQvyp2nQKZ2/GdC7:LEpxCC37BSxGaEeG1a4m+912O87

    • Checks if the Android device is rooted.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks