General

  • Target

    b02f41ebe7a74804daa0effc54e72f9b_JaffaCakes118

  • Size

    30.3MB

  • Sample

    240615-1cx28svfkf

  • MD5

    b02f41ebe7a74804daa0effc54e72f9b

  • SHA1

    6e503bfdd3487d9f684564fd17dadee6e47276bd

  • SHA256

    80c2187fd6d57705f3f13ca3c594e19e721c162a0e580cc262509ce38ca40b12

  • SHA512

    c22c4ba7aa68ce4e3e1058ce9e7ac1a61f39722b3365fbd1766017b74ed199466b01da8df060d4650829ac93f18c288d65c5a3c05c02c2072755d75b2a37e9e0

  • SSDEEP

    786432:eEAk1RIC7HeFMPrYZAX4abnsEA6i6nCx8AS3QXvznQ:11SC7HeS2AX4abnshJ6ny8A78

Malware Config

Targets

    • Target

      b02f41ebe7a74804daa0effc54e72f9b_JaffaCakes118

    • Size

      30.3MB

    • MD5

      b02f41ebe7a74804daa0effc54e72f9b

    • SHA1

      6e503bfdd3487d9f684564fd17dadee6e47276bd

    • SHA256

      80c2187fd6d57705f3f13ca3c594e19e721c162a0e580cc262509ce38ca40b12

    • SHA512

      c22c4ba7aa68ce4e3e1058ce9e7ac1a61f39722b3365fbd1766017b74ed199466b01da8df060d4650829ac93f18c288d65c5a3c05c02c2072755d75b2a37e9e0

    • SSDEEP

      786432:eEAk1RIC7HeFMPrYZAX4abnsEA6i6nCx8AS3QXvznQ:11SC7HeS2AX4abnshJ6ny8A78

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks