General

  • Target

    adf5fcec1af55d26260ec61f1518823c_JaffaCakes118

  • Size

    15.4MB

  • Sample

    240615-mcn8faxanh

  • MD5

    adf5fcec1af55d26260ec61f1518823c

  • SHA1

    0252ac1dad91637aeb618cdabe67e464401a8232

  • SHA256

    d20cbab9dc5c3c36a258979eb56c3bb611e9a1112c7233ee9fd8eb2928523be7

  • SHA512

    c90ccc6b9ecf72df5243e4d511ba3c9e5b9a8dc19d7d90c2db81ac21847491e8c47b5076329ed78524f83407cc80b9690d855c1ab754fe7acc5d818fc3d4cecc

  • SSDEEP

    393216:oZ3GR8FJcrJaBcV4Ec2poP0SXE8A8qjEpOlkFlo8MyN9oXzGBt:w3bJQJccVdpqXBA8qQpUkFloyWqBt

Malware Config

Targets

    • Target

      adf5fcec1af55d26260ec61f1518823c_JaffaCakes118

    • Size

      15.4MB

    • MD5

      adf5fcec1af55d26260ec61f1518823c

    • SHA1

      0252ac1dad91637aeb618cdabe67e464401a8232

    • SHA256

      d20cbab9dc5c3c36a258979eb56c3bb611e9a1112c7233ee9fd8eb2928523be7

    • SHA512

      c90ccc6b9ecf72df5243e4d511ba3c9e5b9a8dc19d7d90c2db81ac21847491e8c47b5076329ed78524f83407cc80b9690d855c1ab754fe7acc5d818fc3d4cecc

    • SSDEEP

      393216:oZ3GR8FJcrJaBcV4Ec2poP0SXE8A8qjEpOlkFlo8MyN9oXzGBt:w3bJQJccVdpqXBA8qQpUkFloyWqBt

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks