General

  • Target

    13402b42985c06a335e8412921b7ba16_JaffaCakes118

  • Size

    8.0MB

  • Sample

    241004-n1837awgqa

  • MD5

    13402b42985c06a335e8412921b7ba16

  • SHA1

    3c0fcd2d3bd5027b1e20e772e2e3725aec83113f

  • SHA256

    03f41b4d33b28dcd96af5b18cae2ec4a76d37c5b86c7cacea7e6bef85381663d

  • SHA512

    769142daa90d0746871f01ff250fd411a0c2158fce9b55202685b59f8939aa0893098c2fbe7a14effa03186d1442166621945067a2d65877d4fd74afbbb17d9b

  • SSDEEP

    196608:PX6WPBj1LxT/25Zid0VmFRMnqWsI0BqEyg85jS:PKWpj1FQ02mFMsZoEygYS

Malware Config

Targets

    • Target

      13402b42985c06a335e8412921b7ba16_JaffaCakes118

    • Size

      8.0MB

    • MD5

      13402b42985c06a335e8412921b7ba16

    • SHA1

      3c0fcd2d3bd5027b1e20e772e2e3725aec83113f

    • SHA256

      03f41b4d33b28dcd96af5b18cae2ec4a76d37c5b86c7cacea7e6bef85381663d

    • SHA512

      769142daa90d0746871f01ff250fd411a0c2158fce9b55202685b59f8939aa0893098c2fbe7a14effa03186d1442166621945067a2d65877d4fd74afbbb17d9b

    • SSDEEP

      196608:PX6WPBj1LxT/25Zid0VmFRMnqWsI0BqEyg85jS:PKWpj1FQ02mFMsZoEygYS

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks