General

  • Target

    bf131fe8e95bf133c521d13047b61b08_JaffaCakes118

  • Size

    24.4MB

  • Sample

    240824-vq7wpszhqb

  • MD5

    bf131fe8e95bf133c521d13047b61b08

  • SHA1

    d68308638f678e9ec01715e96c4d47f3b311d657

  • SHA256

    36a990225799947f58ed6e72c3baeabe5b55942726ea9543b4deeb9adcd33fc6

  • SHA512

    90ac76af1805cb801c3584fc4098b1f8caab3b5ce3686316de6d9c43100d3b8c846d53399f0972ff7c7161339dec721b97339b3694e1eead9a9bd655f112b3e4

  • SSDEEP

    786432:A9HCWObG5N6uAnbljEkVfbWb7P3ANbPUVbnJ:A9HCWObWN6uANEQfMb3ANbyDJ

Malware Config

Targets

    • Target

      bf131fe8e95bf133c521d13047b61b08_JaffaCakes118

    • Size

      24.4MB

    • MD5

      bf131fe8e95bf133c521d13047b61b08

    • SHA1

      d68308638f678e9ec01715e96c4d47f3b311d657

    • SHA256

      36a990225799947f58ed6e72c3baeabe5b55942726ea9543b4deeb9adcd33fc6

    • SHA512

      90ac76af1805cb801c3584fc4098b1f8caab3b5ce3686316de6d9c43100d3b8c846d53399f0972ff7c7161339dec721b97339b3694e1eead9a9bd655f112b3e4

    • SSDEEP

      786432:A9HCWObG5N6uAnbljEkVfbWb7P3ANbPUVbnJ:A9HCWObWN6uANEQfMb3ANbyDJ

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks