General

  • Target

    b549eac8b39cd580ba7c8d597bc5efb3_JaffaCakes118

  • Size

    11.1MB

  • Sample

    240616-1axzfssgjl

  • MD5

    b549eac8b39cd580ba7c8d597bc5efb3

  • SHA1

    34c40a2e6a3137b1c0eb6d47c86be50f1859a97b

  • SHA256

    9c9e78c04c1bb8c3c0bf4a73d383dce01b3bea8bcc361ea89af9b061cfbd57d1

  • SHA512

    f8f2e21daa277e030c2928b769811e749dc4d17b319ca18c5fb04811dea90953014ad52fb4cc476225eb326c24b0b34a2edc6e16acf0b6ce7f884b6a53f44212

  • SSDEEP

    196608:5KrZ/YeoQ0zEZfb7+YjQbEYi1s0OqnjH+UgNEe5k6IoQ5D0ckH1ajlEZfbEY2:0YwZWCQbEYiXVX4k6mwH1ajWZfbEn

Malware Config

Targets

    • Target

      b549eac8b39cd580ba7c8d597bc5efb3_JaffaCakes118

    • Size

      11.1MB

    • MD5

      b549eac8b39cd580ba7c8d597bc5efb3

    • SHA1

      34c40a2e6a3137b1c0eb6d47c86be50f1859a97b

    • SHA256

      9c9e78c04c1bb8c3c0bf4a73d383dce01b3bea8bcc361ea89af9b061cfbd57d1

    • SHA512

      f8f2e21daa277e030c2928b769811e749dc4d17b319ca18c5fb04811dea90953014ad52fb4cc476225eb326c24b0b34a2edc6e16acf0b6ce7f884b6a53f44212

    • SSDEEP

      196608:5KrZ/YeoQ0zEZfb7+YjQbEYi1s0OqnjH+UgNEe5k6IoQ5D0ckH1ajlEZfbEY2:0YwZWCQbEYiXVX4k6mwH1ajWZfbEn

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks