General

  • Target

    702a0cc93e3f677f9d281c9cf4311d01_JaffaCakes118

  • Size

    4.7MB

  • Sample

    241023-wmbjrsshlf

  • MD5

    702a0cc93e3f677f9d281c9cf4311d01

  • SHA1

    daf8d41e234be8fa8ac8e54a343be4e2d3691377

  • SHA256

    9077784e2d0b6441557d9df659523c3537d0ec07fbbe60cd740c993ac7ebfa04

  • SHA512

    927e881ac8d6168278bd8dc61119829b4c6820a3284045159daf4d2e2eda076c66370add757b4f4f07762b2b6584289361cf9469bbb89ba04c986158d25e1765

  • SSDEEP

    98304:ntg+05XWx/PTyaQ0HUJTvtHDzQfaZ6ewD4FHZY43coUQENOIgK1:H05cyaN8TxQwe4/Y4qNO2

Malware Config

Targets

    • Target

      702a0cc93e3f677f9d281c9cf4311d01_JaffaCakes118

    • Size

      4.7MB

    • MD5

      702a0cc93e3f677f9d281c9cf4311d01

    • SHA1

      daf8d41e234be8fa8ac8e54a343be4e2d3691377

    • SHA256

      9077784e2d0b6441557d9df659523c3537d0ec07fbbe60cd740c993ac7ebfa04

    • SHA512

      927e881ac8d6168278bd8dc61119829b4c6820a3284045159daf4d2e2eda076c66370add757b4f4f07762b2b6584289361cf9469bbb89ba04c986158d25e1765

    • SSDEEP

      98304:ntg+05XWx/PTyaQ0HUJTvtHDzQfaZ6ewD4FHZY43coUQENOIgK1:H05cyaN8TxQwe4/Y4qNO2

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks