General

  • Target

    d3d5d7f2aea1439263daa9e82e2e3988_JaffaCakes118

  • Size

    13.9MB

  • Sample

    240908-h8prmavhrg

  • MD5

    d3d5d7f2aea1439263daa9e82e2e3988

  • SHA1

    65fbaaf29bbbfddcb0f70a61063c1fcfa7f0710f

  • SHA256

    06e6c8f2f1db778160fd4a86f9d746aeda72393d5edb01208cb3d8528d5397e2

  • SHA512

    7ca1da8f95f7d5b0e2224d7e4c80c16b450ce92a16e4c66adfaaa9b18b1556c4f15d6c1cf0267f713123b105e1ae386eca7a70bff7641effa28624a2208bb9e4

  • SSDEEP

    393216:aHhY2Gmr+voSzjpvQcgZqdcOHXeCjzPAY:u/+wSzjp+QdHXeCjP

Malware Config

Targets

    • Target

      d3d5d7f2aea1439263daa9e82e2e3988_JaffaCakes118

    • Size

      13.9MB

    • MD5

      d3d5d7f2aea1439263daa9e82e2e3988

    • SHA1

      65fbaaf29bbbfddcb0f70a61063c1fcfa7f0710f

    • SHA256

      06e6c8f2f1db778160fd4a86f9d746aeda72393d5edb01208cb3d8528d5397e2

    • SHA512

      7ca1da8f95f7d5b0e2224d7e4c80c16b450ce92a16e4c66adfaaa9b18b1556c4f15d6c1cf0267f713123b105e1ae386eca7a70bff7641effa28624a2208bb9e4

    • SSDEEP

      393216:aHhY2Gmr+voSzjpvQcgZqdcOHXeCjzPAY:u/+wSzjp+QdHXeCjP

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks