General

  • Target

    bc1cffd1ca941c5d40c99c8876602c99_JaffaCakes118

  • Size

    12.3MB

  • Sample

    240618-qfepysygmm

  • MD5

    bc1cffd1ca941c5d40c99c8876602c99

  • SHA1

    21038bcc5571f33a2fd2ff8500c347b0e20668d8

  • SHA256

    3ca357b28ae4ab1a5270d89050ad4b5662d4ba16e18858198053e319ef54bf79

  • SHA512

    44ba9c56baed211a867cb3476db09e4a88fe7cbba78e1a50177e197e2ad0b02e2bb3e48fd701af3d02d4a07fc005bdfd3fc3f1a0c0495df11a2ee8d8a3d7f81d

  • SSDEEP

    196608:YD2jJW053tRDxUgtu4usSQY/URNLiwedO/C45f4pyoMBpkhgaN+6L/706ddll9qk:YgY05dKs7YGFC4bBpMdT0slTKUTzcRRI

Malware Config

Targets

    • Target

      bc1cffd1ca941c5d40c99c8876602c99_JaffaCakes118

    • Size

      12.3MB

    • MD5

      bc1cffd1ca941c5d40c99c8876602c99

    • SHA1

      21038bcc5571f33a2fd2ff8500c347b0e20668d8

    • SHA256

      3ca357b28ae4ab1a5270d89050ad4b5662d4ba16e18858198053e319ef54bf79

    • SHA512

      44ba9c56baed211a867cb3476db09e4a88fe7cbba78e1a50177e197e2ad0b02e2bb3e48fd701af3d02d4a07fc005bdfd3fc3f1a0c0495df11a2ee8d8a3d7f81d

    • SSDEEP

      196608:YD2jJW053tRDxUgtu4usSQY/URNLiwedO/C45f4pyoMBpkhgaN+6L/706ddll9qk:YgY05dKs7YGFC4bBpMdT0slTKUTzcRRI

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks