General

  • Target

    b0fa09b179f16e864d9a2dc1e31e70b3_JaffaCakes118

  • Size

    1.3MB

  • Sample

    240616-a6ngsascjd

  • MD5

    b0fa09b179f16e864d9a2dc1e31e70b3

  • SHA1

    78d20b5c97f5ac1a5abcba6032072fa6a7cae660

  • SHA256

    71e3793c7ce87add11b47ef8a8e1a0db0dd5237349ab3c5e2a9bb6c87ff0f722

  • SHA512

    2f83e66942e32b6e8b68be092b880c71089969400cc8eeba86440699bcb4453bb161841096165fbcf0958a74d64c84b1608faccdf7d30b7e0e0d5b4b803cc09d

  • SSDEEP

    24576:LE9wwFm9wwFMoNJ9ZgCe1Tqq+8BL+aI0iWccC44lcwzGver2MjkV7DzJI:LECpC079ZgR1OsV+aIdWcBO3vLvxHO

Malware Config

Targets

    • Target

      b0fa09b179f16e864d9a2dc1e31e70b3_JaffaCakes118

    • Size

      1.3MB

    • MD5

      b0fa09b179f16e864d9a2dc1e31e70b3

    • SHA1

      78d20b5c97f5ac1a5abcba6032072fa6a7cae660

    • SHA256

      71e3793c7ce87add11b47ef8a8e1a0db0dd5237349ab3c5e2a9bb6c87ff0f722

    • SHA512

      2f83e66942e32b6e8b68be092b880c71089969400cc8eeba86440699bcb4453bb161841096165fbcf0958a74d64c84b1608faccdf7d30b7e0e0d5b4b803cc09d

    • SSDEEP

      24576:LE9wwFm9wwFMoNJ9ZgCe1Tqq+8BL+aI0iWccC44lcwzGver2MjkV7DzJI:LECpC079ZgR1OsV+aIdWcBO3vLvxHO

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks