General

  • Target

    d041d7a3bd37103a51faa8295dbf5986_JaffaCakes118

  • Size

    5.9MB

  • Sample

    240906-xqk32sshqq

  • MD5

    d041d7a3bd37103a51faa8295dbf5986

  • SHA1

    f5f4e269a29c1cd2390d0f09b41cc5b0f880dbc2

  • SHA256

    ce429f54e9f5753532cad2c609dc46975d0ca5ef792c496e37e3f626a014c7bd

  • SHA512

    9c0df5551a6f70399f92104e7fa1c6bcfc5bcd12f499c2ace191ed9c4579baeee4ce6e0bd34ec9808c1aea470e6f42480ebf1eb507c48b5c43615f03b6112a61

  • SSDEEP

    98304:5fsadOybik4gpS8U90VUJyr53bgOE25JAOPArfT6+F95UHmZkgK:MLaS8U9qUJyVgORbPgT6qKx

Malware Config

Targets

    • Target

      d041d7a3bd37103a51faa8295dbf5986_JaffaCakes118

    • Size

      5.9MB

    • MD5

      d041d7a3bd37103a51faa8295dbf5986

    • SHA1

      f5f4e269a29c1cd2390d0f09b41cc5b0f880dbc2

    • SHA256

      ce429f54e9f5753532cad2c609dc46975d0ca5ef792c496e37e3f626a014c7bd

    • SHA512

      9c0df5551a6f70399f92104e7fa1c6bcfc5bcd12f499c2ace191ed9c4579baeee4ce6e0bd34ec9808c1aea470e6f42480ebf1eb507c48b5c43615f03b6112a61

    • SSDEEP

      98304:5fsadOybik4gpS8U90VUJyr53bgOE25JAOPArfT6+F95UHmZkgK:MLaS8U9qUJyVgORbPgT6qKx

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks