General

  • Target

    81cae85eda4f7551fec7111e1b4e2144_JaffaCakes118

  • Size

    10.5MB

  • Sample

    240801-1cekws1dma

  • MD5

    81cae85eda4f7551fec7111e1b4e2144

  • SHA1

    65f2a27305c3c9da3e882af6139d5bc6725c83b2

  • SHA256

    1aa44fcf5a2d988d0e100ae2c90cdcb10f117e6794fc514ef28fffc05652adb7

  • SHA512

    aa55e92e11862f695a962c862c322a1ae998429ff55c497f07e451d9558ea6be68affbca7658c535e0157cdc8eb170daf72d514f9c629ff05cd2d154a63d00f7

  • SSDEEP

    196608:QLEmFKJAI0nEl5I1u6rw2WPeneUxeJwedO/C4u7UCkM/maN+6L/706dR9tRGCkp4:QLDnEl5I1u6rZnd00C42/LT0sRiw

Malware Config

Targets

    • Target

      81cae85eda4f7551fec7111e1b4e2144_JaffaCakes118

    • Size

      10.5MB

    • MD5

      81cae85eda4f7551fec7111e1b4e2144

    • SHA1

      65f2a27305c3c9da3e882af6139d5bc6725c83b2

    • SHA256

      1aa44fcf5a2d988d0e100ae2c90cdcb10f117e6794fc514ef28fffc05652adb7

    • SHA512

      aa55e92e11862f695a962c862c322a1ae998429ff55c497f07e451d9558ea6be68affbca7658c535e0157cdc8eb170daf72d514f9c629ff05cd2d154a63d00f7

    • SSDEEP

      196608:QLEmFKJAI0nEl5I1u6rw2WPeneUxeJwedO/C4u7UCkM/maN+6L/706dR9tRGCkp4:QLDnEl5I1u6rZnd00C42/LT0sRiw

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks