General

  • Target

    ac2a387a7d8df186153119ff18b93c55_JaffaCakes118

  • Size

    6.9MB

  • Sample

    240615-af3h1ssarf

  • MD5

    ac2a387a7d8df186153119ff18b93c55

  • SHA1

    a63490300e3d5b945d70e2d13ddfc12e76938003

  • SHA256

    8de6a58c876cac41f9bf99acdc1cd1708e3e2f5daf8647bc5577daec2babceb6

  • SHA512

    e07cccb2c6b9dcf9c7a3d5690b4439a1a261caf879d8df68cb27f498ed3fc10b536d5967911811747f4b526ba77568aeaef73f9c0ae61bc44cd83615e0977bba

  • SSDEEP

    196608:71W7FU2H/rEKPQFLy+ZFqDGjjFpR1N6crIM:74b/rR+ZF7XEU

Malware Config

Targets

    • Target

      ac2a387a7d8df186153119ff18b93c55_JaffaCakes118

    • Size

      6.9MB

    • MD5

      ac2a387a7d8df186153119ff18b93c55

    • SHA1

      a63490300e3d5b945d70e2d13ddfc12e76938003

    • SHA256

      8de6a58c876cac41f9bf99acdc1cd1708e3e2f5daf8647bc5577daec2babceb6

    • SHA512

      e07cccb2c6b9dcf9c7a3d5690b4439a1a261caf879d8df68cb27f498ed3fc10b536d5967911811747f4b526ba77568aeaef73f9c0ae61bc44cd83615e0977bba

    • SSDEEP

      196608:71W7FU2H/rEKPQFLy+ZFqDGjjFpR1N6crIM:74b/rR+ZF7XEU

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

    • Requests cell location

      Uses Android APIs to to get current cell information.

MITRE ATT&CK Mobile v15

Tasks