General

  • Target

    517ead892a02fb01c80b8f86d84edf1d_JaffaCakes118

  • Size

    7.3MB

  • Sample

    241017-k5nfha1dnf

  • MD5

    517ead892a02fb01c80b8f86d84edf1d

  • SHA1

    3bf7841b63fff2d3dcaf7227b1c2b6e1f4018351

  • SHA256

    069a36e703dca25d2dd963a6faa495e9b2982e62d067bb0fe03ff1d5a67d725a

  • SHA512

    a781069dd52d8491df0b9a961861ad41035bbf694418956dde986a6dffe6fde32b9b0a3b304fab549df5c97cdb6de5877cd2729337dae7ad2dfee786b23f6bf0

  • SSDEEP

    196608:FeBnRHblkyKS5gsnLrVR3Ml+hyIFGQGXj4XLf3BPBMQhEJeH+K/ljtSwCTn:FeHX5xfVRiI0EFPK5x08win

Malware Config

Targets

    • Target

      517ead892a02fb01c80b8f86d84edf1d_JaffaCakes118

    • Size

      7.3MB

    • MD5

      517ead892a02fb01c80b8f86d84edf1d

    • SHA1

      3bf7841b63fff2d3dcaf7227b1c2b6e1f4018351

    • SHA256

      069a36e703dca25d2dd963a6faa495e9b2982e62d067bb0fe03ff1d5a67d725a

    • SHA512

      a781069dd52d8491df0b9a961861ad41035bbf694418956dde986a6dffe6fde32b9b0a3b304fab549df5c97cdb6de5877cd2729337dae7ad2dfee786b23f6bf0

    • SSDEEP

      196608:FeBnRHblkyKS5gsnLrVR3Ml+hyIFGQGXj4XLf3BPBMQhEJeH+K/ljtSwCTn:FeHX5xfVRiI0EFPK5x08win

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks