General

  • Target

    f674676d94e81489d4373744eb7d3be6_JaffaCakes118

  • Size

    13.1MB

  • Sample

    240925-vgzhzazcjg

  • MD5

    f674676d94e81489d4373744eb7d3be6

  • SHA1

    9d131f62a5ca7e706dc2302397a797939deb05b0

  • SHA256

    fde7b7509097cf57cb013682f9e2864c3bc34e9bd4b455892dbe12619602f471

  • SHA512

    5fffb1aac021e57e17aeb6b4e909681cc392aa19c48f5b8e6f70286de31a59c73935e2e18674f27ea67f349318fee8f5cf1065c58b124b2cdea737cedfe5a384

  • SSDEEP

    393216:aULDX9Msr+JvZYM5cJvZYM0DDrQmFoV3pR1ImYuZVd:aU39MsroxYM5qxYM0DDcmCJf1I0P

Malware Config

Targets

    • Target

      f674676d94e81489d4373744eb7d3be6_JaffaCakes118

    • Size

      13.1MB

    • MD5

      f674676d94e81489d4373744eb7d3be6

    • SHA1

      9d131f62a5ca7e706dc2302397a797939deb05b0

    • SHA256

      fde7b7509097cf57cb013682f9e2864c3bc34e9bd4b455892dbe12619602f471

    • SHA512

      5fffb1aac021e57e17aeb6b4e909681cc392aa19c48f5b8e6f70286de31a59c73935e2e18674f27ea67f349318fee8f5cf1065c58b124b2cdea737cedfe5a384

    • SSDEEP

      393216:aULDX9Msr+JvZYM5cJvZYM0DDrQmFoV3pR1ImYuZVd:aU39MsroxYM5qxYM0DDcmCJf1I0P

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about active data network

MITRE ATT&CK Mobile v15

Tasks