General

  • Target

    b5698581361b5d6e0e79fe7403768d5e_JaffaCakes118

  • Size

    30.2MB

  • Sample

    240616-1zzjkszfqg

  • MD5

    b5698581361b5d6e0e79fe7403768d5e

  • SHA1

    1709ee5b5905b22469d97f8e2e1642d998c5c998

  • SHA256

    5d65d27b16502dafa4701cefe186d962642cc41cfdeb0f6e009f4985d3dc5d38

  • SHA512

    34e91e944098a94622bee9a96f4fa1403717cd3959a7daf5705858b1422de21ea7876a61da528bc9e3a37f050220825c99157579c535bfa34c288b8fee93aa6d

  • SSDEEP

    786432:mv84H1GIC7jSHMt9Q9s7ZPjBsE+zW3SC1SUeVQbuJBW:m51tC7jSsisNPjBsDK3S6SUke

Malware Config

Targets

    • Target

      b5698581361b5d6e0e79fe7403768d5e_JaffaCakes118

    • Size

      30.2MB

    • MD5

      b5698581361b5d6e0e79fe7403768d5e

    • SHA1

      1709ee5b5905b22469d97f8e2e1642d998c5c998

    • SHA256

      5d65d27b16502dafa4701cefe186d962642cc41cfdeb0f6e009f4985d3dc5d38

    • SHA512

      34e91e944098a94622bee9a96f4fa1403717cd3959a7daf5705858b1422de21ea7876a61da528bc9e3a37f050220825c99157579c535bfa34c288b8fee93aa6d

    • SSDEEP

      786432:mv84H1GIC7jSHMt9Q9s7ZPjBsE+zW3SC1SUeVQbuJBW:m51tC7jSsisNPjBsDK3S6SUke

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks