General

  • Target

    ada14a5e5609c7ab5dafd9d14b75edb4_JaffaCakes118

  • Size

    30.1MB

  • Sample

    240615-ktezzsyalk

  • MD5

    ada14a5e5609c7ab5dafd9d14b75edb4

  • SHA1

    389f4578f653db64145e902c8188c5b3bbd7f5dc

  • SHA256

    a54d7ce55011577a1f7fd028d0a20de5170514a40cbe6c584fe6e7d0837da0b9

  • SHA512

    2be98600d0e8069e3545ab8cfbc5aa68f000150042f14a44648ee122684ef2edaf1009e7713a5aa785fd3b8ca2bbc358222e7f4186cd9d2f8f2b6b96302cb45f

  • SSDEEP

    786432:vOUkP1LIC7nG8Mc3Ah4JZPdxsE+ff7+pULECiQvmYeO:m18C7nGDL43PdxsLn7+KLEjM

Malware Config

Targets

    • Target

      ada14a5e5609c7ab5dafd9d14b75edb4_JaffaCakes118

    • Size

      30.1MB

    • MD5

      ada14a5e5609c7ab5dafd9d14b75edb4

    • SHA1

      389f4578f653db64145e902c8188c5b3bbd7f5dc

    • SHA256

      a54d7ce55011577a1f7fd028d0a20de5170514a40cbe6c584fe6e7d0837da0b9

    • SHA512

      2be98600d0e8069e3545ab8cfbc5aa68f000150042f14a44648ee122684ef2edaf1009e7713a5aa785fd3b8ca2bbc358222e7f4186cd9d2f8f2b6b96302cb45f

    • SSDEEP

      786432:vOUkP1LIC7nG8Mc3Ah4JZPdxsE+ff7+pULECiQvmYeO:m18C7nGDL43PdxsLn7+KLEjM

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks