General

  • Target

    8601af853a0c90ecbb17341a167db091_JaffaCakes118

  • Size

    10.4MB

  • Sample

    241102-r61wjsznel

  • MD5

    8601af853a0c90ecbb17341a167db091

  • SHA1

    d415a13bc0d22f85cbc9bc83a3c497d97521686d

  • SHA256

    8b333f29f9da4ec21d41993acb5baf643cf64630458790be9236c92c8a84218e

  • SHA512

    ae0cd8fba470d9f2aa2dfc45a5be194b12375741ad2179b5c66add4285657e083979fef4596b06ee6d0ed1900bc92b8cbc3961725b3fb7451f491ba27a5f687b

  • SSDEEP

    196608:zOdmFKcAwKhJ5ASVtK0HGWFpdqBwedO/C4l7FRmkM/maN+6L/706dR9t0pCkpy8S:zOXtASBzqMC4m/LT0sRsS

Malware Config

Targets

    • Target

      8601af853a0c90ecbb17341a167db091_JaffaCakes118

    • Size

      10.4MB

    • MD5

      8601af853a0c90ecbb17341a167db091

    • SHA1

      d415a13bc0d22f85cbc9bc83a3c497d97521686d

    • SHA256

      8b333f29f9da4ec21d41993acb5baf643cf64630458790be9236c92c8a84218e

    • SHA512

      ae0cd8fba470d9f2aa2dfc45a5be194b12375741ad2179b5c66add4285657e083979fef4596b06ee6d0ed1900bc92b8cbc3961725b3fb7451f491ba27a5f687b

    • SSDEEP

      196608:zOdmFKcAwKhJ5ASVtK0HGWFpdqBwedO/C4l7FRmkM/maN+6L/706dR9t0pCkpy8S:zOXtASBzqMC4m/LT0sRsS

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks