General

  • Target

    f9ebf0de8608ebdd003b40106d009cce_JaffaCakes118

  • Size

    19.5MB

  • Sample

    240419-khdmsada43

  • MD5

    f9ebf0de8608ebdd003b40106d009cce

  • SHA1

    1b70ddb6934001786fa7dc6a4ed668abde5e559e

  • SHA256

    710bd9874073ec7c085d2077605398f971d7e4e61dd1e3f823dd389dc10d30fc

  • SHA512

    03f6493c442e2ec348aa18c1850619a38a62451d75c5df11cb35fa61947b06ceb8f535ff5b95e99ed690ffbf38844c8de5c2902a6fdc9a3842665e47b8f47a07

  • SSDEEP

    393216:AIP/DXz2eq44r1q4055WVlt8wGFSWWPwRAQTDeXLA2eBPMW3BY1F88Zs:h/DDBq4u0z6ljGFSWWPIxfeXLAv/3UFG

Malware Config

Targets

    • Target

      f9ebf0de8608ebdd003b40106d009cce_JaffaCakes118

    • Size

      19.5MB

    • MD5

      f9ebf0de8608ebdd003b40106d009cce

    • SHA1

      1b70ddb6934001786fa7dc6a4ed668abde5e559e

    • SHA256

      710bd9874073ec7c085d2077605398f971d7e4e61dd1e3f823dd389dc10d30fc

    • SHA512

      03f6493c442e2ec348aa18c1850619a38a62451d75c5df11cb35fa61947b06ceb8f535ff5b95e99ed690ffbf38844c8de5c2902a6fdc9a3842665e47b8f47a07

    • SSDEEP

      393216:AIP/DXz2eq44r1q4055WVlt8wGFSWWPwRAQTDeXLA2eBPMW3BY1F88Zs:h/DDBq4u0z6ljGFSWWPIxfeXLAv/3UFG

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current Wi-Fi connection.

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Matrix

Tasks