General

  • Target

    b1d45a508c04e4a5f6664e9ddac28127_JaffaCakes118

  • Size

    5.7MB

  • Sample

    240616-fmj8xavbml

  • MD5

    b1d45a508c04e4a5f6664e9ddac28127

  • SHA1

    f133a535b28659c64ade7dcfa5c22538619b8ffd

  • SHA256

    6be3cba9be1ce0c21f05bb19dfff973eb898d3702a9420418d315d2bf43cdf38

  • SHA512

    be8bd2f6870c0759810258c4e5c11773cb57d67566872bdb4d98c9054d6d4b5cca9a1f342bf1fbd8766591328fd5503453af2d9f335c440543bfd34a0106c4f1

  • SSDEEP

    98304:6jgZGKUjx7cV9Y4efjfk2VoJR+q3Hv7AmxFKlz1Wc93bX:6sycsj3oJRBf7LxFWz1WuLX

Malware Config

Targets

    • Target

      b1d45a508c04e4a5f6664e9ddac28127_JaffaCakes118

    • Size

      5.7MB

    • MD5

      b1d45a508c04e4a5f6664e9ddac28127

    • SHA1

      f133a535b28659c64ade7dcfa5c22538619b8ffd

    • SHA256

      6be3cba9be1ce0c21f05bb19dfff973eb898d3702a9420418d315d2bf43cdf38

    • SHA512

      be8bd2f6870c0759810258c4e5c11773cb57d67566872bdb4d98c9054d6d4b5cca9a1f342bf1fbd8766591328fd5503453af2d9f335c440543bfd34a0106c4f1

    • SSDEEP

      98304:6jgZGKUjx7cV9Y4efjfk2VoJR+q3Hv7AmxFKlz1Wc93bX:6sycsj3oJRBf7LxFWz1WuLX

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks