General

  • Target

    f60dc36a96806a3a1e00cedd58a1f46d_JaffaCakes118

  • Size

    12.3MB

  • Sample

    240925-p3b2xazbje

  • MD5

    f60dc36a96806a3a1e00cedd58a1f46d

  • SHA1

    83e2ba24e44cd589f2dc62d019a8f38fdb1b72bf

  • SHA256

    acdb472e21bc2e2a16492a2e0badcfd5aa122943965716631036e33ac3fbd99a

  • SHA512

    8fa54d86d1562ee73afedbbfcbc9829342642a8ac550b787f662de376ffa3ab948f5637dc4c317f59e225100775019c2015413a674acbf2e86117432cea19616

  • SSDEEP

    393216:kFG7GgdaYTClcx9uICa63bbJw3zPzoTy0eqS:cEFQlc3uIJ6nJw37zoWMS

Malware Config

Targets

    • Target

      f60dc36a96806a3a1e00cedd58a1f46d_JaffaCakes118

    • Size

      12.3MB

    • MD5

      f60dc36a96806a3a1e00cedd58a1f46d

    • SHA1

      83e2ba24e44cd589f2dc62d019a8f38fdb1b72bf

    • SHA256

      acdb472e21bc2e2a16492a2e0badcfd5aa122943965716631036e33ac3fbd99a

    • SHA512

      8fa54d86d1562ee73afedbbfcbc9829342642a8ac550b787f662de376ffa3ab948f5637dc4c317f59e225100775019c2015413a674acbf2e86117432cea19616

    • SSDEEP

      393216:kFG7GgdaYTClcx9uICa63bbJw3zPzoTy0eqS:cEFQlc3uIJ6nJw37zoWMS

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks