General

  • Target

    f0b90e84a02ce153066b4c89e6a658c5_JaffaCakes118

  • Size

    18.5MB

  • Sample

    240921-185f7axcpl

  • MD5

    f0b90e84a02ce153066b4c89e6a658c5

  • SHA1

    7c2de191eb4cfb34f1e3135dc527a7b47eaa0066

  • SHA256

    e254b52940f712001a328f74d8dec33390e08de03052a7de9f46ca2e793ddde2

  • SHA512

    e8cf1134b79dabe124fb63adca39910ee2f5aaff349c17ed1cc4ec4f0a7ee7d07797292e68a82a0eb4818cf87fe2d3a2b5ab5b834d8d97d38ad132db23cd366f

  • SSDEEP

    393216:eEbFN32MIs+cLILJJqsr6pKOLtEa4T36VfyJRBfFBNb:pL2MXMJz6CtTOy/BfF7

Malware Config

Targets

    • Target

      f0b90e84a02ce153066b4c89e6a658c5_JaffaCakes118

    • Size

      18.5MB

    • MD5

      f0b90e84a02ce153066b4c89e6a658c5

    • SHA1

      7c2de191eb4cfb34f1e3135dc527a7b47eaa0066

    • SHA256

      e254b52940f712001a328f74d8dec33390e08de03052a7de9f46ca2e793ddde2

    • SHA512

      e8cf1134b79dabe124fb63adca39910ee2f5aaff349c17ed1cc4ec4f0a7ee7d07797292e68a82a0eb4818cf87fe2d3a2b5ab5b834d8d97d38ad132db23cd366f

    • SSDEEP

      393216:eEbFN32MIs+cLILJJqsr6pKOLtEa4T36VfyJRBfFBNb:pL2MXMJz6CtTOy/BfF7

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Target

      HotFixHack.apk

    • Size

      2KB

    • MD5

      799a4e2869c2d57cb0588365498fa7a7

    • SHA1

      a2cabc9d9a5d017d6bad7e033bd546681764840a

    • SHA256

      bf9134c2f263579808648d8fdd87980a25145e93e1d73b92571ece0d14669fd2

    • SHA512

      b01fa177ac56d8c40e7a6b1d13d1ad49a094d18e09876f3e55c778ab9f3dfa132ba5206dddcf1810e24da50d8d56108b0f53b5fffa73c31bce696e1bab68e843

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks