General

  • Target

    8cb4a77ed16ff532a649904cf1668378_JaffaCakes118

  • Size

    5.2MB

  • Sample

    241103-v9cvnsyqfs

  • MD5

    8cb4a77ed16ff532a649904cf1668378

  • SHA1

    9d339b94a2c5143e701758337919907503f3ffed

  • SHA256

    38352c3d95b5fddada696d1212ef31735ad5e4ec869bf34ffb044eaa320a2300

  • SHA512

    082c965d95daac7481ce079f0f00baa85d6a0ede61d39f2a96a2cecad1935ca124e9363a267e3dc15d7210b4789fff07d83f2fb5e1e2b841c26308151bba35fd

  • SSDEEP

    98304:TZiAbpI144v9esRVgesKHb/7iCwi3JfbeHTrN6cDGX0Dxk0jqx:Niam144VR+K7zltJezrC0Q

Malware Config

Targets

    • Target

      8cb4a77ed16ff532a649904cf1668378_JaffaCakes118

    • Size

      5.2MB

    • MD5

      8cb4a77ed16ff532a649904cf1668378

    • SHA1

      9d339b94a2c5143e701758337919907503f3ffed

    • SHA256

      38352c3d95b5fddada696d1212ef31735ad5e4ec869bf34ffb044eaa320a2300

    • SHA512

      082c965d95daac7481ce079f0f00baa85d6a0ede61d39f2a96a2cecad1935ca124e9363a267e3dc15d7210b4789fff07d83f2fb5e1e2b841c26308151bba35fd

    • SSDEEP

      98304:TZiAbpI144v9esRVgesKHb/7iCwi3JfbeHTrN6cDGX0Dxk0jqx:Niam144VR+K7zltJezrC0Q

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

    • Target

      com.pp.service.apk

    • Size

      335KB

    • MD5

      8fc0e41e28f8295e4dd246cd14b0bb9e

    • SHA1

      3d48a6b428d39e54f04954e294df52b6f2e3f955

    • SHA256

      45ae34277a4d844861ea92ec5bdbf8103e4b5d82c7acd5c174cbb27cf97d53b9

    • SHA512

      58638d93ae4cd35ea485812cb32c3a9d2d508a95570f120311bcefde08f7384938125e9fe04c8340e7aa23bbec078008206ea8f9a150ff93f44d01d8301ed950

    • SSDEEP

      6144:E13PYMm9GBBVX9oI7N7Fuzvl9itmJmht/9z4M1N9t3Oj955T8z:LcBBAIZZuzvY7hvzv1N9tej955wz

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks