General

  • Target

    16072e69efe5466e4f4537e2039c5960_JaffaCakes118

  • Size

    378KB

  • Sample

    241005-eaachaxglc

  • MD5

    16072e69efe5466e4f4537e2039c5960

  • SHA1

    75a2a392a4dbc9eecf679f74ab4cbcd0cbad75db

  • SHA256

    55ee4235bbc07eabbce3dad2b950ca49f00e39be0fe430cd6a7ba1af72241754

  • SHA512

    6e3b51d50b557952cf1b88f516ac2479b6023aeb518544a769fd638bc2d8d8e8a76fdfd3ac057d8630646fb6e45855c4455b7df8dbb3c68072b8250f804b727d

  • SSDEEP

    6144:w1alIf9rFq9IknzA2NwoRmsT6uAto7YVoEcl2s+XdCcPBS:wElIrFZCpvT67y6oEcMjXdCc8

Malware Config

Targets

    • Target

      16072e69efe5466e4f4537e2039c5960_JaffaCakes118

    • Size

      378KB

    • MD5

      16072e69efe5466e4f4537e2039c5960

    • SHA1

      75a2a392a4dbc9eecf679f74ab4cbcd0cbad75db

    • SHA256

      55ee4235bbc07eabbce3dad2b950ca49f00e39be0fe430cd6a7ba1af72241754

    • SHA512

      6e3b51d50b557952cf1b88f516ac2479b6023aeb518544a769fd638bc2d8d8e8a76fdfd3ac057d8630646fb6e45855c4455b7df8dbb3c68072b8250f804b727d

    • SSDEEP

      6144:w1alIf9rFq9IknzA2NwoRmsT6uAto7YVoEcl2s+XdCcPBS:wElIrFZCpvT67y6oEcMjXdCc8

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks