General

  • Target

    af87e4e46b056615beccb816d623fbff_JaffaCakes118

  • Size

    10.2MB

  • Sample

    240615-vxwr1sycqa

  • MD5

    af87e4e46b056615beccb816d623fbff

  • SHA1

    0a932b4e8fd991fe3c07e6cb5fbd9e0f132293d3

  • SHA256

    8289c7bf941e9686b1e5cc1b7ba456e8489c9457e90613c1b570244e374de8b7

  • SHA512

    37fb986b23643ec1034f8a1dbdad3ac649b3d3c45f7eb185481dbefa2a5818c8e5f0d444b8a3649156a81998a7659aedd07bbbdd6ac32874185a2cc4e6c7c874

  • SSDEEP

    196608:iQuiSEQll0/m+voL/sChqLLf6wxEOKJ7y51cRH9U1OYR/BOrBbBC6iqzI:iQeRj0/1voL/s0qf6e/51cRH9UUo/BOe

Malware Config

Targets

    • Target

      af87e4e46b056615beccb816d623fbff_JaffaCakes118

    • Size

      10.2MB

    • MD5

      af87e4e46b056615beccb816d623fbff

    • SHA1

      0a932b4e8fd991fe3c07e6cb5fbd9e0f132293d3

    • SHA256

      8289c7bf941e9686b1e5cc1b7ba456e8489c9457e90613c1b570244e374de8b7

    • SHA512

      37fb986b23643ec1034f8a1dbdad3ac649b3d3c45f7eb185481dbefa2a5818c8e5f0d444b8a3649156a81998a7659aedd07bbbdd6ac32874185a2cc4e6c7c874

    • SSDEEP

      196608:iQuiSEQll0/m+voL/sChqLLf6wxEOKJ7y51cRH9U1OYR/BOrBbBC6iqzI:iQeRj0/1voL/s0qf6e/51cRH9UUo/BOe

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks