General

  • Target

    53389b449280c29c1f078960a467facd_JaffaCakes118

  • Size

    5.7MB

  • Sample

    241017-xp3lpstejq

  • MD5

    53389b449280c29c1f078960a467facd

  • SHA1

    df95f996aaaad05894beca4116763b8a51fff24f

  • SHA256

    ecb48190068500e532387f2e5183787d2c9f747ee2e4e84aa60ff1399d32c46c

  • SHA512

    0495f229ebc9158c0a7ac8ac41a8059c0680219d4de6f881b93f0520c263e29e4475d848d020ab843ecd7931a63c457a893e7859f77172f6f414f95ffd12c416

  • SSDEEP

    98304:7CeKkUysC5+aYRG6wNoQQzhdnwojUKvBnZG86JItwfCgUDxVh75d/y:2hyXoStQLnnWJItwfbUDxpdq

Malware Config

Targets

    • Target

      53389b449280c29c1f078960a467facd_JaffaCakes118

    • Size

      5.7MB

    • MD5

      53389b449280c29c1f078960a467facd

    • SHA1

      df95f996aaaad05894beca4116763b8a51fff24f

    • SHA256

      ecb48190068500e532387f2e5183787d2c9f747ee2e4e84aa60ff1399d32c46c

    • SHA512

      0495f229ebc9158c0a7ac8ac41a8059c0680219d4de6f881b93f0520c263e29e4475d848d020ab843ecd7931a63c457a893e7859f77172f6f414f95ffd12c416

    • SSDEEP

      98304:7CeKkUysC5+aYRG6wNoQQzhdnwojUKvBnZG86JItwfCgUDxVh75d/y:2hyXoStQLnnWJItwfbUDxpdq

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks