General

  • Target

    8daa50ed9a482ce7aab5feb2a9509282_JaffaCakes118

  • Size

    19.1MB

  • Sample

    240812-g8h4eayfrm

  • MD5

    8daa50ed9a482ce7aab5feb2a9509282

  • SHA1

    faf46bbbd3527068f5e2ef26e0485d973c1df930

  • SHA256

    a5b93c7aa7e717d1ee70ed73dec333f8d8b20364a852d6d5751ebda1d9fe12e7

  • SHA512

    48b537f40101877ccf262c59a19b03689456f3fe3b65f5c470fef5e1d137d75fadde01f35798832fa0abc070b65f7ae7c3067f4482c97fa16a04853db5119474

  • SSDEEP

    393216:f/P2uTZeGBeS1Z5mbxjK9Wjj8fnN6y/Ar3xoPXPtCBbCYCZNGo0bywsf7u7ic7Aq:P2uTZvLxlWjjsnN9YTsaKNt0Ef7uOMAq

Malware Config

Targets

    • Target

      8daa50ed9a482ce7aab5feb2a9509282_JaffaCakes118

    • Size

      19.1MB

    • MD5

      8daa50ed9a482ce7aab5feb2a9509282

    • SHA1

      faf46bbbd3527068f5e2ef26e0485d973c1df930

    • SHA256

      a5b93c7aa7e717d1ee70ed73dec333f8d8b20364a852d6d5751ebda1d9fe12e7

    • SHA512

      48b537f40101877ccf262c59a19b03689456f3fe3b65f5c470fef5e1d137d75fadde01f35798832fa0abc070b65f7ae7c3067f4482c97fa16a04853db5119474

    • SSDEEP

      393216:f/P2uTZeGBeS1Z5mbxjK9Wjj8fnN6y/Ar3xoPXPtCBbCYCZNGo0bywsf7u7ic7Aq:P2uTZvLxlWjjsnN9YTsaKNt0Ef7uOMAq

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks