General

  • Target

    JaffaCakes118_1e62d9da4fa8947cbba82eb148c7ca3b

  • Size

    3.0MB

  • Sample

    250706-f8axcsar2v

  • MD5

    1e62d9da4fa8947cbba82eb148c7ca3b

  • SHA1

    2f3bc61db7f0611e82b2c589f5b64a532caaa957

  • SHA256

    a349b8beae153e6bc4c1d41a2e889e667bb02285f9ace78a27c0519efa06cb1d

  • SHA512

    acd4e865f5c6b843d3cd31d99fafe077360fc6cd4f959103a6d7a61f739dd8cb3276e5f889b5e9d0b3e63ae863ec55614126df6d495b1360a4f18496cdfe8c9c

  • SSDEEP

    98304:b/IXp73lyCxvEyibGb9u9MIzpWR3QTAM+e/:+3ly0ErGboUR3QkM+e/

Malware Config

Targets

    • Target

      JaffaCakes118_1e62d9da4fa8947cbba82eb148c7ca3b

    • Size

      3.0MB

    • MD5

      1e62d9da4fa8947cbba82eb148c7ca3b

    • SHA1

      2f3bc61db7f0611e82b2c589f5b64a532caaa957

    • SHA256

      a349b8beae153e6bc4c1d41a2e889e667bb02285f9ace78a27c0519efa06cb1d

    • SHA512

      acd4e865f5c6b843d3cd31d99fafe077360fc6cd4f959103a6d7a61f739dd8cb3276e5f889b5e9d0b3e63ae863ec55614126df6d495b1360a4f18496cdfe8c9c

    • SSDEEP

      98304:b/IXp73lyCxvEyibGb9u9MIzpWR3QTAM+e/:+3ly0ErGboUR3QkM+e/

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v16

Tasks