General

  • Target

    27c9f45b31b1e7792003896a159bcf9c_JaffaCakes118

  • Size

    2.6MB

  • Sample

    241009-av2v2axhqd

  • MD5

    27c9f45b31b1e7792003896a159bcf9c

  • SHA1

    9e1605027332308592124b97f531fb2f642236a0

  • SHA256

    cd09c5a5c972f900fc1a994431c593860675dc4fd935f63e004778131a67c56c

  • SHA512

    620ecff9eeb639e105bb93ea055a125a461f8a65e3bf041f0739a5e8c8370506b3d6931a516ccc34e59bcf6dd27f0e59d480c3afcc71f6961b7a4b94d36f0971

  • SSDEEP

    49152:Ef3Ei2Lnu2S9xphxvrymYbEIuhvCjtCeGyDtUGAUe7NqOZDnCuhOPEL+DV2s7qm+:g38u2SkmYfujyPAJqO5CuMR2SjF+t4E

Malware Config

Targets

    • Target

      27c9f45b31b1e7792003896a159bcf9c_JaffaCakes118

    • Size

      2.6MB

    • MD5

      27c9f45b31b1e7792003896a159bcf9c

    • SHA1

      9e1605027332308592124b97f531fb2f642236a0

    • SHA256

      cd09c5a5c972f900fc1a994431c593860675dc4fd935f63e004778131a67c56c

    • SHA512

      620ecff9eeb639e105bb93ea055a125a461f8a65e3bf041f0739a5e8c8370506b3d6931a516ccc34e59bcf6dd27f0e59d480c3afcc71f6961b7a4b94d36f0971

    • SSDEEP

      49152:Ef3Ei2Lnu2S9xphxvrymYbEIuhvCjtCeGyDtUGAUe7NqOZDnCuhOPEL+DV2s7qm+:g38u2SkmYfujyPAJqO5CuMR2SjF+t4E

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks