General

  • Target

    bd4efb3a8a4156234deedf1fbf69f593_JaffaCakes118

  • Size

    2.7MB

  • Sample

    240619-t68x9syckr

  • MD5

    bd4efb3a8a4156234deedf1fbf69f593

  • SHA1

    2d619d4b46bea395ad059af190b34cf7701331e9

  • SHA256

    0cdae26e327656437b20901b3ccf50ae32634b71168103844047077aac07fff5

  • SHA512

    6271168b565bd2c98fc1bc53bcda45ce327f8315c820a20f1ac7de1988f479e2fb284933ad1f676257acdb239fe835caeddd3ec6bb38b34f942818c32482b96f

  • SSDEEP

    49152:o7gyxaFeaCRcvpNL2CdlpY3kWFIXDz4HucN5s6iggjRvFn9mmUf3CGDmpnQzL:2g8VDipNL26po3KDzaN5PiggtFnkmMvH

Malware Config

Targets

    • Target

      bd4efb3a8a4156234deedf1fbf69f593_JaffaCakes118

    • Size

      2.7MB

    • MD5

      bd4efb3a8a4156234deedf1fbf69f593

    • SHA1

      2d619d4b46bea395ad059af190b34cf7701331e9

    • SHA256

      0cdae26e327656437b20901b3ccf50ae32634b71168103844047077aac07fff5

    • SHA512

      6271168b565bd2c98fc1bc53bcda45ce327f8315c820a20f1ac7de1988f479e2fb284933ad1f676257acdb239fe835caeddd3ec6bb38b34f942818c32482b96f

    • SSDEEP

      49152:o7gyxaFeaCRcvpNL2CdlpY3kWFIXDz4HucN5s6iggjRvFn9mmUf3CGDmpnQzL:2g8VDipNL26po3KDzaN5PiggtFnkmMvH

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks