General

  • Target

    ea834930c43a76d98efad6f8b053987f_JaffaCakes118

  • Size

    30.2MB

  • Sample

    240919-d6rqzsyhnp

  • MD5

    ea834930c43a76d98efad6f8b053987f

  • SHA1

    802aa3e9971bf16c2b8c979bc975aa450454808c

  • SHA256

    93273d89cb6ee36db352fa95880564156dde39a69648beb3b9e01fd71d2aab88

  • SHA512

    4eff371d175b0a37fadad423538c502ec9fdb8748d7024ca3479dd76cf54d8cdc919f6846f3d4de7e59018966e264962819c13a61bc7cd445ece60fab632ffb3

  • SSDEEP

    786432:AgfB1xIC7T6NMImmdupZPAAsEY2MuvZAgo+/QvznjC:d1yC7T664uXPAAsR7uvSgonG

Malware Config

Targets

    • Target

      ea834930c43a76d98efad6f8b053987f_JaffaCakes118

    • Size

      30.2MB

    • MD5

      ea834930c43a76d98efad6f8b053987f

    • SHA1

      802aa3e9971bf16c2b8c979bc975aa450454808c

    • SHA256

      93273d89cb6ee36db352fa95880564156dde39a69648beb3b9e01fd71d2aab88

    • SHA512

      4eff371d175b0a37fadad423538c502ec9fdb8748d7024ca3479dd76cf54d8cdc919f6846f3d4de7e59018966e264962819c13a61bc7cd445ece60fab632ffb3

    • SSDEEP

      786432:AgfB1xIC7T6NMImmdupZPAAsEY2MuvZAgo+/QvznjC:d1yC7T664uXPAAsR7uvSgonG

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks