General

  • Target

    07601cb359287b868c3ea52ef6cc00ec_JaffaCakes118

  • Size

    19.4MB

  • Sample

    240328-rbg5ysfh8v

  • MD5

    07601cb359287b868c3ea52ef6cc00ec

  • SHA1

    c012f56bc9990888830cb3403c198a3c2479df33

  • SHA256

    c4c9b8429e65d9827d88a8985fd884f57921c67b26bb5ff6c98ec6925242614a

  • SHA512

    4a41da554ab7485130107f062761df5ebaa2253a8a3d28d6e8dbea34002aeb4dabe5c844a560b1e25ae499d1c0f91fbb5f001d3eea713383c0753e418227be1e

  • SSDEEP

    393216:nNb6MnjZNFZJJ0K91fIbRGUPagPUmW92unv05O/B9gwDLOnR0y8:NmgtNFZUKvIbRPJPUYIb9gwn8Gy8

Malware Config

Targets

    • Target

      07601cb359287b868c3ea52ef6cc00ec_JaffaCakes118

    • Size

      19.4MB

    • MD5

      07601cb359287b868c3ea52ef6cc00ec

    • SHA1

      c012f56bc9990888830cb3403c198a3c2479df33

    • SHA256

      c4c9b8429e65d9827d88a8985fd884f57921c67b26bb5ff6c98ec6925242614a

    • SHA512

      4a41da554ab7485130107f062761df5ebaa2253a8a3d28d6e8dbea34002aeb4dabe5c844a560b1e25ae499d1c0f91fbb5f001d3eea713383c0753e418227be1e

    • SSDEEP

      393216:nNb6MnjZNFZJJ0K91fIbRGUPagPUmW92unv05O/B9gwDLOnR0y8:NmgtNFZUKvIbRPJPUYIb9gwn8Gy8

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks