General

  • Target

    ea888aec00b448fef31dc67925bd20c9_JaffaCakes118

  • Size

    13.4MB

  • Sample

    240919-eergkszbqe

  • MD5

    ea888aec00b448fef31dc67925bd20c9

  • SHA1

    f316e0e2495a25a27b65b0988e327461d22c5d1d

  • SHA256

    cfa394542d95b5735ec49b1afcf305e7cfad7e10a5a4d9e9f5233d23c154a113

  • SHA512

    dc632b82ac3ccf6298ac9a6c2a87577088d0529c6d125b30a407f9d0f7280cad6a91135a181e28b8d2fd1b56e91ebe5ed312f1f164013619961d4bb39c58d90e

  • SSDEEP

    393216:fgwisbxbGC0DVpE8vyGOZ2U81KzTJHWmX3buM:f5bxuDVlyGhU8QzTFWmbv

Malware Config

Targets

    • Target

      ea888aec00b448fef31dc67925bd20c9_JaffaCakes118

    • Size

      13.4MB

    • MD5

      ea888aec00b448fef31dc67925bd20c9

    • SHA1

      f316e0e2495a25a27b65b0988e327461d22c5d1d

    • SHA256

      cfa394542d95b5735ec49b1afcf305e7cfad7e10a5a4d9e9f5233d23c154a113

    • SHA512

      dc632b82ac3ccf6298ac9a6c2a87577088d0529c6d125b30a407f9d0f7280cad6a91135a181e28b8d2fd1b56e91ebe5ed312f1f164013619961d4bb39c58d90e

    • SSDEEP

      393216:fgwisbxbGC0DVpE8vyGOZ2U81KzTJHWmX3buM:f5bxuDVlyGhU8QzTFWmbv

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the phone number (MSISDN for GSM devices)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks