General

  • Target

    4a2c1c9208c5d223319851fd1149fcd5_JaffaCakes118

  • Size

    8.5MB

  • Sample

    241015-1p5b3staqj

  • MD5

    4a2c1c9208c5d223319851fd1149fcd5

  • SHA1

    f34c82381fc105142e97bd59cc0e563d636ca1d4

  • SHA256

    77f8cf1e697b7f4a9c8a3cb3d9820f71d0185f7bbe454d9ca674eea95a32863a

  • SHA512

    986c0b808f9833edcff1374bdcf4fd00937cfcc80a4a1599aefaa6f8d5e0e981a861a28176ad50e823807b73c867632b22e3246aff655a3a38b6d69a71954be1

  • SSDEEP

    196608:+4fsnI+0wlIIrw0DxFTxj7VGL97ntFacXquvxJo1y:+4fMl9rw8x3M5TtRXquv01y

Malware Config

Targets

    • Target

      4a2c1c9208c5d223319851fd1149fcd5_JaffaCakes118

    • Size

      8.5MB

    • MD5

      4a2c1c9208c5d223319851fd1149fcd5

    • SHA1

      f34c82381fc105142e97bd59cc0e563d636ca1d4

    • SHA256

      77f8cf1e697b7f4a9c8a3cb3d9820f71d0185f7bbe454d9ca674eea95a32863a

    • SHA512

      986c0b808f9833edcff1374bdcf4fd00937cfcc80a4a1599aefaa6f8d5e0e981a861a28176ad50e823807b73c867632b22e3246aff655a3a38b6d69a71954be1

    • SSDEEP

      196608:+4fsnI+0wlIIrw0DxFTxj7VGL97ntFacXquvxJo1y:+4fMl9rw8x3M5TtRXquv01y

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks