General

  • Target

    890959e6b5a5910473021c58a050a9cb_JaffaCakes118

  • Size

    13.1MB

  • Sample

    241103-b7k9gs1gqp

  • MD5

    890959e6b5a5910473021c58a050a9cb

  • SHA1

    cc2a2ab0824815384d391d0b2d086158817c9373

  • SHA256

    9857283f1102d93a16f480040157a59cc90f71e1233231358840c85d8892ab52

  • SHA512

    bf6318ef870fbef1b772a02062cafb4fc22baca35c10fc57b8aee224ad2acfe4494e7226ea2dfa30cdec9650455f915fd59d4ab6005e65ca8fe2f0cf20938708

  • SSDEEP

    393216:Ve20BPmrVbI/wgZzqQ4kjwvvnb8NSLpvjBni:F6Pp4gZzqQ4kJCBi

Malware Config

Targets

    • Target

      890959e6b5a5910473021c58a050a9cb_JaffaCakes118

    • Size

      13.1MB

    • MD5

      890959e6b5a5910473021c58a050a9cb

    • SHA1

      cc2a2ab0824815384d391d0b2d086158817c9373

    • SHA256

      9857283f1102d93a16f480040157a59cc90f71e1233231358840c85d8892ab52

    • SHA512

      bf6318ef870fbef1b772a02062cafb4fc22baca35c10fc57b8aee224ad2acfe4494e7226ea2dfa30cdec9650455f915fd59d4ab6005e65ca8fe2f0cf20938708

    • SSDEEP

      393216:Ve20BPmrVbI/wgZzqQ4kjwvvnb8NSLpvjBni:F6Pp4gZzqQ4kJCBi

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks