General

  • Target

    e118ec2a0823ac073ce00b5e0eeb92f3_JaffaCakes118

  • Size

    19.4MB

  • Sample

    240914-1la9tsybqd

  • MD5

    e118ec2a0823ac073ce00b5e0eeb92f3

  • SHA1

    5e2f00b6dd6aa1cae4fef446abc646887a070260

  • SHA256

    ee5143ff0941d0f221cf6d86c3dd91cdd4a163409fb54bfffa68680c47ab954e

  • SHA512

    0aa0693df44f1640273e4d28f0eda278c08f01c916c59c3b322de7d4f471f34f2106e9995a2163981b9bb4123fd73edaaf0ae7c8bbda55c688fbfe94714fc0cf

  • SSDEEP

    393216:ROahw00oq4Fh6zwLNsVznEchWFd6fC5VVlLZNWL6jaU1xkEz:fTZFhwmNsVzuFkfoVHn4Sxk8

Malware Config

Targets

    • Target

      e118ec2a0823ac073ce00b5e0eeb92f3_JaffaCakes118

    • Size

      19.4MB

    • MD5

      e118ec2a0823ac073ce00b5e0eeb92f3

    • SHA1

      5e2f00b6dd6aa1cae4fef446abc646887a070260

    • SHA256

      ee5143ff0941d0f221cf6d86c3dd91cdd4a163409fb54bfffa68680c47ab954e

    • SHA512

      0aa0693df44f1640273e4d28f0eda278c08f01c916c59c3b322de7d4f471f34f2106e9995a2163981b9bb4123fd73edaaf0ae7c8bbda55c688fbfe94714fc0cf

    • SSDEEP

      393216:ROahw00oq4Fh6zwLNsVznEchWFd6fC5VVlLZNWL6jaU1xkEz:fTZFhwmNsVzuFkfoVHn4Sxk8

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks