General

  • Target

    3e1006079f0bb76a0a2806f71a216eff_JaffaCakes118

  • Size

    17.9MB

  • Sample

    240514-gby4csda33

  • MD5

    3e1006079f0bb76a0a2806f71a216eff

  • SHA1

    a2ad242d61a6873d3921908d84e3d911ce63e24f

  • SHA256

    64cd089bdc62b462ca6c61d4f69c736558aa6c58bf591f2ba65b06f65acf5ce9

  • SHA512

    7c5bdea0c4f2607d73d029e00d29031d325c503645ce69960cea8c56cda080d88bfa5235a707b5d2ffd045d9ef1851b1be618dc1e2664858a68bcf14d9a65e8a

  • SSDEEP

    393216:Z6jAdZ5D9opbZBIPerHcV+r2tF9YC307gf/dgXRJX94i:Z6jAdXDAZBIPeryF9/Ec2XzXKi

Malware Config

Targets

    • Target

      3e1006079f0bb76a0a2806f71a216eff_JaffaCakes118

    • Size

      17.9MB

    • MD5

      3e1006079f0bb76a0a2806f71a216eff

    • SHA1

      a2ad242d61a6873d3921908d84e3d911ce63e24f

    • SHA256

      64cd089bdc62b462ca6c61d4f69c736558aa6c58bf591f2ba65b06f65acf5ce9

    • SHA512

      7c5bdea0c4f2607d73d029e00d29031d325c503645ce69960cea8c56cda080d88bfa5235a707b5d2ffd045d9ef1851b1be618dc1e2664858a68bcf14d9a65e8a

    • SSDEEP

      393216:Z6jAdZ5D9opbZBIPerHcV+r2tF9YC307gf/dgXRJX94i:Z6jAdXDAZBIPeryF9/Ec2XzXKi

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks