General

  • Target

    6f78dfd49d82a125afb7cd72f31fcaab_JaffaCakes118

  • Size

    6.6MB

  • Sample

    241023-r5myasvhrf

  • MD5

    6f78dfd49d82a125afb7cd72f31fcaab

  • SHA1

    48cb220bc26916177d1bca087714e999ff51eec3

  • SHA256

    482a99ae6b5193b601cd53dd123bb72161f3dc42d89d09b5e39b1c96de0081cf

  • SHA512

    80b26da67c8fd74a780eee077e8b3f2b7f473d0f88e1292f18c59a4a74792bc83bf744561368b42f6ae3d8e24484b5b058ed93b0a5652bfb1a72d6a72afb306e

  • SSDEEP

    196608:RWqiz/WrdMfB1+ciTkFKPklBjHPc71eafaYDwV:Rliz/WxaB1z7omBjkpSYDo

Malware Config

Targets

    • Target

      6f78dfd49d82a125afb7cd72f31fcaab_JaffaCakes118

    • Size

      6.6MB

    • MD5

      6f78dfd49d82a125afb7cd72f31fcaab

    • SHA1

      48cb220bc26916177d1bca087714e999ff51eec3

    • SHA256

      482a99ae6b5193b601cd53dd123bb72161f3dc42d89d09b5e39b1c96de0081cf

    • SHA512

      80b26da67c8fd74a780eee077e8b3f2b7f473d0f88e1292f18c59a4a74792bc83bf744561368b42f6ae3d8e24484b5b058ed93b0a5652bfb1a72d6a72afb306e

    • SSDEEP

      196608:RWqiz/WrdMfB1+ciTkFKPklBjHPc71eafaYDwV:Rliz/WxaB1z7omBjkpSYDo

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks