General

  • Target

    aa7da091aeedeb6841e58605fe648fe2_JaffaCakes118

  • Size

    30.8MB

  • Sample

    240614-s5t72s1anp

  • MD5

    aa7da091aeedeb6841e58605fe648fe2

  • SHA1

    e68b3a05abf7dc96f00f39b044e7f73181a17241

  • SHA256

    cdf1cb38cd90729c456daf780420615cd8160145688707e75d3adae41fd4b9ef

  • SHA512

    a8d3028a81115f50e7decb54b97e9a4d159fbbe6f2f9c3d52b3d707fcc455514d3172346e6d773e7cea7e0e8202f3ca0e5a634bc251caf6dda927343e0637271

  • SSDEEP

    786432:iVY/kvGWk6A7GlFTUb4QU8Tw/sat1+T9+2h2:jkuWEeFTQU8Sz+p+h

Malware Config

Targets

    • Target

      aa7da091aeedeb6841e58605fe648fe2_JaffaCakes118

    • Size

      30.8MB

    • MD5

      aa7da091aeedeb6841e58605fe648fe2

    • SHA1

      e68b3a05abf7dc96f00f39b044e7f73181a17241

    • SHA256

      cdf1cb38cd90729c456daf780420615cd8160145688707e75d3adae41fd4b9ef

    • SHA512

      a8d3028a81115f50e7decb54b97e9a4d159fbbe6f2f9c3d52b3d707fcc455514d3172346e6d773e7cea7e0e8202f3ca0e5a634bc251caf6dda927343e0637271

    • SSDEEP

      786432:iVY/kvGWk6A7GlFTUb4QU8Tw/sat1+T9+2h2:jkuWEeFTQU8Sz+p+h

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks