General

  • Target

    6fb1c6cbbfcb6bffb8d11e8bec17e950_JaffaCakes118

  • Size

    6.1MB

  • Sample

    241023-s5pbssxgqh

  • MD5

    6fb1c6cbbfcb6bffb8d11e8bec17e950

  • SHA1

    ffc004cdbe3457b462f211083b251850bbf1d07c

  • SHA256

    40c1244981f68378ae7c002054a9229c7bef666fe88936595bccc61d1154c48c

  • SHA512

    35055954c6e204c131f7ce2058bb3136827a42e3ac7cc00efb95f8fdb8081eb7844f0a2d41a561e12258785bdf7fe81cf9c037f501c9f14813e8cf86e226936b

  • SSDEEP

    98304:FAvbdBGOgUWEjMxYSH67rR5WO1OFAhEQ0XDaP0EFImD08ayOuEKiiV6KmYx5j+Z:F8ZBUsyvEWOJhiXD7EFH08CuEKF2YxVE

Malware Config

Targets

    • Target

      6fb1c6cbbfcb6bffb8d11e8bec17e950_JaffaCakes118

    • Size

      6.1MB

    • MD5

      6fb1c6cbbfcb6bffb8d11e8bec17e950

    • SHA1

      ffc004cdbe3457b462f211083b251850bbf1d07c

    • SHA256

      40c1244981f68378ae7c002054a9229c7bef666fe88936595bccc61d1154c48c

    • SHA512

      35055954c6e204c131f7ce2058bb3136827a42e3ac7cc00efb95f8fdb8081eb7844f0a2d41a561e12258785bdf7fe81cf9c037f501c9f14813e8cf86e226936b

    • SSDEEP

      98304:FAvbdBGOgUWEjMxYSH67rR5WO1OFAhEQ0XDaP0EFImD08ayOuEKiiV6KmYx5j+Z:F8ZBUsyvEWOJhiXD7EFH08CuEKF2YxVE

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks