General

  • Target

    dd9640f7af0ae9fb2249c0289a54f3bb_JaffaCakes118

  • Size

    3.3MB

  • Sample

    240913-d5ed9ssblk

  • MD5

    dd9640f7af0ae9fb2249c0289a54f3bb

  • SHA1

    c7d13fc3d1ca0b916c207cf1aabd2b5520cd0691

  • SHA256

    1fc0289858e6a49f71af36bd7e0a1cc6aea61d570145ac2c0ee53309ab020b94

  • SHA512

    0651a3b74b3daa574d0187ef7753783711f0ce0e59026e746f9a7f858e693288c8af96ae7669bd8b19f68ce5fcc2ad4e460943bfa97bafdefdf37d7b986431f3

  • SSDEEP

    98304:xugfuWWFkFL7EBasOqFRl8Fr24J73DwpwOtywXN3XWiBj3y:xvLWOLpEcJpXL

Malware Config

Targets

    • Target

      dd9640f7af0ae9fb2249c0289a54f3bb_JaffaCakes118

    • Size

      3.3MB

    • MD5

      dd9640f7af0ae9fb2249c0289a54f3bb

    • SHA1

      c7d13fc3d1ca0b916c207cf1aabd2b5520cd0691

    • SHA256

      1fc0289858e6a49f71af36bd7e0a1cc6aea61d570145ac2c0ee53309ab020b94

    • SHA512

      0651a3b74b3daa574d0187ef7753783711f0ce0e59026e746f9a7f858e693288c8af96ae7669bd8b19f68ce5fcc2ad4e460943bfa97bafdefdf37d7b986431f3

    • SSDEEP

      98304:xugfuWWFkFL7EBasOqFRl8Fr24J73DwpwOtywXN3XWiBj3y:xvLWOLpEcJpXL

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks