General

  • Target

    8c49a6a3051c272907667bc7effed5d4_JaffaCakes118

  • Size

    17.9MB

  • Sample

    241103-td6mfaxgrg

  • MD5

    8c49a6a3051c272907667bc7effed5d4

  • SHA1

    70750e7df02db36d249fdbb5ed0ea74373dc4716

  • SHA256

    5375141c4f45bda9aad3b4d545b9bb95c93e2c0fa1faa913ba9a620aed63dc89

  • SHA512

    1363715afc2ae63187d72fa849e789cf2958634afa53167a995b4ba62f9da6ab3b9741a49847cfb98fbb170d7551494c3dcd197c8e9dbe031139530534943f2b

  • SSDEEP

    393216:fQYQj5xQCRULuscruby6z33pdym8ScxLmp:fQYs5xQdcruNpBcFmp

Malware Config

Targets

    • Target

      8c49a6a3051c272907667bc7effed5d4_JaffaCakes118

    • Size

      17.9MB

    • MD5

      8c49a6a3051c272907667bc7effed5d4

    • SHA1

      70750e7df02db36d249fdbb5ed0ea74373dc4716

    • SHA256

      5375141c4f45bda9aad3b4d545b9bb95c93e2c0fa1faa913ba9a620aed63dc89

    • SHA512

      1363715afc2ae63187d72fa849e789cf2958634afa53167a995b4ba62f9da6ab3b9741a49847cfb98fbb170d7551494c3dcd197c8e9dbe031139530534943f2b

    • SSDEEP

      393216:fQYQj5xQCRULuscruby6z33pdym8ScxLmp:fQYs5xQdcruNpBcFmp

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Requests cell location

      Uses Android APIs to to get current cell information.

MITRE ATT&CK Mobile v15

Tasks