General

  • Target

    d7173c9babd973dd4260cc7efb85e449_JaffaCakes118

  • Size

    30.2MB

  • Sample

    240909-zw8gmssbqa

  • MD5

    d7173c9babd973dd4260cc7efb85e449

  • SHA1

    4deb564964978af6db1689174ff73247df42125f

  • SHA256

    f1c48d8c9ddf6ae95352e31a4652fda20d4f48e11381ce9b19a30f8610e6f5a7

  • SHA512

    ed8cc015ebdbf6a72eaed7abf94fa67454e9c02a478dc8c5a2a4570181b6c9bc7407acfd907232d6204ce9bd0535eeb6a16fa4014cd862f47cd052b3dc428e76

  • SSDEEP

    786432:SVdQweQqLsEdxIC7CosqZPbV0evaN2y1M6GIZ1toXb:gpersuyC7CosoPbGhN2l691O

Malware Config

Targets

    • Target

      d7173c9babd973dd4260cc7efb85e449_JaffaCakes118

    • Size

      30.2MB

    • MD5

      d7173c9babd973dd4260cc7efb85e449

    • SHA1

      4deb564964978af6db1689174ff73247df42125f

    • SHA256

      f1c48d8c9ddf6ae95352e31a4652fda20d4f48e11381ce9b19a30f8610e6f5a7

    • SHA512

      ed8cc015ebdbf6a72eaed7abf94fa67454e9c02a478dc8c5a2a4570181b6c9bc7407acfd907232d6204ce9bd0535eeb6a16fa4014cd862f47cd052b3dc428e76

    • SSDEEP

      786432:SVdQweQqLsEdxIC7CosqZPbV0evaN2y1M6GIZ1toXb:gpersuyC7CosoPbGhN2l691O

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks