General

  • Target

    8bdeccec7c4c54e6e59d1a9659a18708_JaffaCakes118

  • Size

    11.7MB

  • Sample

    241103-rgz8qawclf

  • MD5

    8bdeccec7c4c54e6e59d1a9659a18708

  • SHA1

    0a37433b8b8d3b5f147dce716abea70c4542492e

  • SHA256

    2600a547c89199f238fb9af0aa22a5e817b4afaad14a07c8a82be5cddc32e4f1

  • SHA512

    ca9df33d79beb7d82f6e9fc792034fbcca1f0f2740ec142e91b9a753fb036c93a2fdc39bef427d4899c4d88bbe4609bb674864cba59736bf0a30e46c334ab2d9

  • SSDEEP

    196608:ZlIWDsc0oKXqZNr+6vA3CGiAXgTHeaIl0HfVhXiJhTo0sMrQAyK8lgxu+U8T9QwB:zvDl0Pc+A9THaOf/ibTofMrQlv6hUE91

Malware Config

Targets

    • Target

      8bdeccec7c4c54e6e59d1a9659a18708_JaffaCakes118

    • Size

      11.7MB

    • MD5

      8bdeccec7c4c54e6e59d1a9659a18708

    • SHA1

      0a37433b8b8d3b5f147dce716abea70c4542492e

    • SHA256

      2600a547c89199f238fb9af0aa22a5e817b4afaad14a07c8a82be5cddc32e4f1

    • SHA512

      ca9df33d79beb7d82f6e9fc792034fbcca1f0f2740ec142e91b9a753fb036c93a2fdc39bef427d4899c4d88bbe4609bb674864cba59736bf0a30e46c334ab2d9

    • SSDEEP

      196608:ZlIWDsc0oKXqZNr+6vA3CGiAXgTHeaIl0HfVhXiJhTo0sMrQAyK8lgxu+U8T9QwB:zvDl0Pc+A9THaOf/ibTofMrQlv6hUE91

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks