General

  • Target

    573a18635db094cdd55f67e0a49b34a4_JaffaCakes118

  • Size

    19.1MB

  • Sample

    241018-nqrq6axdmj

  • MD5

    573a18635db094cdd55f67e0a49b34a4

  • SHA1

    1e04ffb53b2c7d82899bbc73fed69566f61c94db

  • SHA256

    f0be31e1e3368c703e7a0c36af9265b80019edd780bd119a4dea2273e719d8db

  • SHA512

    cd481e77019fc035a733a841d7fb8a2420a4066f4599c64692e5e76033f57d3c348bf25d793a8275b89ea797d037f1ee1417236daf1046e028d77a92868f0b30

  • SSDEEP

    393216:NRZa5CY6AzPKd1+ilqhAENrF8hGSqF0VYJ7sHUBBRjYVFsp9:Nza5C0Pe+uajNB8ESqF0VYB/vRQu

Malware Config

Targets

    • Target

      573a18635db094cdd55f67e0a49b34a4_JaffaCakes118

    • Size

      19.1MB

    • MD5

      573a18635db094cdd55f67e0a49b34a4

    • SHA1

      1e04ffb53b2c7d82899bbc73fed69566f61c94db

    • SHA256

      f0be31e1e3368c703e7a0c36af9265b80019edd780bd119a4dea2273e719d8db

    • SHA512

      cd481e77019fc035a733a841d7fb8a2420a4066f4599c64692e5e76033f57d3c348bf25d793a8275b89ea797d037f1ee1417236daf1046e028d77a92868f0b30

    • SSDEEP

      393216:NRZa5CY6AzPKd1+ilqhAENrF8hGSqF0VYJ7sHUBBRjYVFsp9:Nza5C0Pe+uajNB8ESqF0VYB/vRQu

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks