General

  • Target

    ba9d720fa0159028ba61c99e8fa037c9_JaffaCakes118

  • Size

    15.5MB

  • Sample

    240618-jwshesycjm

  • MD5

    ba9d720fa0159028ba61c99e8fa037c9

  • SHA1

    bd74eea6beb74fc7969f27d436cf437ea7ad82b3

  • SHA256

    95babc6c8f993afe3226344bfb209a93a7a9fa7dcd1be9d499fcac41d10fe1a2

  • SHA512

    c37086dbf6d9395ee7f0ea3aaaa1a294b1245896c6ade8852a971ae86ec8ab8efe85e0084ae8863fc5c4804fb5dc5f0508d2c60c9b168bc9dd40af6578a05822

  • SSDEEP

    393216:XCeUVHw0fSjPpZKh26dHMfYppiW88ha/e3IsL:yeg16jPp4h2+sU2KauRL

Malware Config

Targets

    • Target

      ba9d720fa0159028ba61c99e8fa037c9_JaffaCakes118

    • Size

      15.5MB

    • MD5

      ba9d720fa0159028ba61c99e8fa037c9

    • SHA1

      bd74eea6beb74fc7969f27d436cf437ea7ad82b3

    • SHA256

      95babc6c8f993afe3226344bfb209a93a7a9fa7dcd1be9d499fcac41d10fe1a2

    • SHA512

      c37086dbf6d9395ee7f0ea3aaaa1a294b1245896c6ade8852a971ae86ec8ab8efe85e0084ae8863fc5c4804fb5dc5f0508d2c60c9b168bc9dd40af6578a05822

    • SSDEEP

      393216:XCeUVHw0fSjPpZKh26dHMfYppiW88ha/e3IsL:yeg16jPp4h2+sU2KauRL

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks