General

  • Target

    05dc53abf22322be40abe2d59b1fe400_JaffaCakes118

  • Size

    20.7MB

  • Sample

    240428-xln9xaeg4x

  • MD5

    05dc53abf22322be40abe2d59b1fe400

  • SHA1

    35192fbda32e3629688f37fafdd6c9ff5067e395

  • SHA256

    7500d7f711d45a662bb33698d105ab63bf0cdc973735eaca4ca245dd2da53aba

  • SHA512

    703ac95232e1e6a8b901e33c8856687ff1c3498a90650be76c6e52486d75b8d1312a67f5e32fd8e99c730cc6d27f88c3314a6a4bfee2d9fc21ac0aa2d9a99481

  • SSDEEP

    393216:Ifk97dj71X4Csx4Z47My7ACAFpZbgsf9s4BoFaMkh01Ucz/rPeC/GotjDW:Rvj7p4CsxIaMy7S1bgMmioFXhT3xtvW

Malware Config

Targets

    • Target

      05dc53abf22322be40abe2d59b1fe400_JaffaCakes118

    • Size

      20.7MB

    • MD5

      05dc53abf22322be40abe2d59b1fe400

    • SHA1

      35192fbda32e3629688f37fafdd6c9ff5067e395

    • SHA256

      7500d7f711d45a662bb33698d105ab63bf0cdc973735eaca4ca245dd2da53aba

    • SHA512

      703ac95232e1e6a8b901e33c8856687ff1c3498a90650be76c6e52486d75b8d1312a67f5e32fd8e99c730cc6d27f88c3314a6a4bfee2d9fc21ac0aa2d9a99481

    • SSDEEP

      393216:Ifk97dj71X4Csx4Z47My7ACAFpZbgsf9s4BoFaMkh01Ucz/rPeC/GotjDW:Rvj7p4CsxIaMy7S1bgMmioFXhT3xtvW

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks