General

  • Target

    4be7ddbdb3fdb0b8174a5ce0657ad7eb_JaffaCakes118

  • Size

    9.5MB

  • Sample

    240516-tg7nxacf48

  • MD5

    4be7ddbdb3fdb0b8174a5ce0657ad7eb

  • SHA1

    b67e91f58273e289dd972ea86928ca983a1e2dbc

  • SHA256

    b3e386ba39c277065541d25e941e58f3eb91cc4f33edb8bdbe8bd7a6c7c2b1da

  • SHA512

    7e1057c10086b0e15c8f5395aee50e6ba3e38628b4a76a883f8423ad8e0adadca879bcc8a9eb5fc2ed514b3b96e75f9ef2cbd81931a48127827b5e8ff4efbfec

  • SSDEEP

    196608:qIdepOcdsxeFRG9nU+rPyZjhj6lITaL+cc2kDKeNyoWnCgyLLRiugKp+S:ncC4zGi1F0et2kDeoW3yPRiuLT

Malware Config

Targets

    • Target

      4be7ddbdb3fdb0b8174a5ce0657ad7eb_JaffaCakes118

    • Size

      9.5MB

    • MD5

      4be7ddbdb3fdb0b8174a5ce0657ad7eb

    • SHA1

      b67e91f58273e289dd972ea86928ca983a1e2dbc

    • SHA256

      b3e386ba39c277065541d25e941e58f3eb91cc4f33edb8bdbe8bd7a6c7c2b1da

    • SHA512

      7e1057c10086b0e15c8f5395aee50e6ba3e38628b4a76a883f8423ad8e0adadca879bcc8a9eb5fc2ed514b3b96e75f9ef2cbd81931a48127827b5e8ff4efbfec

    • SSDEEP

      196608:qIdepOcdsxeFRG9nU+rPyZjhj6lITaL+cc2kDKeNyoWnCgyLLRiugKp+S:ncC4zGi1F0et2kDeoW3yPRiuLT

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Checks if the internet connection is available

    • Target

      gdtadv2.jar

    • Size

      81KB

    • MD5

      bab097d0d3e73293b96473e264ab98dd

    • SHA1

      2bbe26d0cfda7de723ca7488b6ab9381560a00e6

    • SHA256

      49d880e79b6d27fcaec62cb20e025efee82b20d42c42f9b3be5db89590e275af

    • SHA512

      3e3c54e89c45133cc84e082d93695eaa397b365adfc7b2db89cc194290266583bb830f45673e508489d6135282fc0174898019507f352571018c5ccad5411ca5

    • SSDEEP

      1536:tBbWaj1ARxC+e43cUhO+B0Nt75WlMciDQtF9Iw1I/ewLdOHxDZJurlgoj:3yzxCyrUU0Nt7IlMciDQzIlLgRDZwrlF

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks