General

  • Target

    ef014423aae9726d763f110f32d928b6_JaffaCakes118

  • Size

    12.3MB

  • Sample

    240921-d953satdmq

  • MD5

    ef014423aae9726d763f110f32d928b6

  • SHA1

    afdc80aa667d5eb116f263490a6a28c01d08bd9e

  • SHA256

    c41c57e40e3e80ccff0436f9fc96e7a15c5009fac264fad678db4c478e295de0

  • SHA512

    9fb02e35d01ea0687b8811d879ee23b4f95c5057f9e4e6d9af753a8cdd08d3aa70826c957be4b79676a62d6c06be510ff41c9c8fed40d48e5be1c6cfc3931d9b

  • SSDEEP

    393216:aH7x93LhQIBuwGT1C4QBpMdT0slTKUT8uCLm:aywuhT1C3BmJ0GTKRa

Malware Config

Targets

    • Target

      ef014423aae9726d763f110f32d928b6_JaffaCakes118

    • Size

      12.3MB

    • MD5

      ef014423aae9726d763f110f32d928b6

    • SHA1

      afdc80aa667d5eb116f263490a6a28c01d08bd9e

    • SHA256

      c41c57e40e3e80ccff0436f9fc96e7a15c5009fac264fad678db4c478e295de0

    • SHA512

      9fb02e35d01ea0687b8811d879ee23b4f95c5057f9e4e6d9af753a8cdd08d3aa70826c957be4b79676a62d6c06be510ff41c9c8fed40d48e5be1c6cfc3931d9b

    • SSDEEP

      393216:aH7x93LhQIBuwGT1C4QBpMdT0slTKUT8uCLm:aywuhT1C3BmJ0GTKRa

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks