General

  • Target

    5360b5a6749f49b76b7535e98e58f61d_JaffaCakes118

  • Size

    1.5MB

  • Sample

    240518-g8yh4afg8v

  • MD5

    5360b5a6749f49b76b7535e98e58f61d

  • SHA1

    8e17d18390016925dc75e933f2bee657897f70d0

  • SHA256

    0fa97663cb860d85f302379c038d15f76ec2f858e599b46411a126a721dedcc9

  • SHA512

    8103a781cb054d4296fade5c0530fea6cebde6cc360537de26171940968b9c44c4dccde66867507f78119670f23d3ce6eb2ce71cc38a96ee977fc83ac7859847

  • SSDEEP

    24576:plI/dONx10bIubdwomyYZ/XupouY8DifIFbx9eyarWuOOw5J3OHjE:p6JIazqXupTD8uGyarOeHw

Malware Config

Targets

    • Target

      5360b5a6749f49b76b7535e98e58f61d_JaffaCakes118

    • Size

      1.5MB

    • MD5

      5360b5a6749f49b76b7535e98e58f61d

    • SHA1

      8e17d18390016925dc75e933f2bee657897f70d0

    • SHA256

      0fa97663cb860d85f302379c038d15f76ec2f858e599b46411a126a721dedcc9

    • SHA512

      8103a781cb054d4296fade5c0530fea6cebde6cc360537de26171940968b9c44c4dccde66867507f78119670f23d3ce6eb2ce71cc38a96ee977fc83ac7859847

    • SSDEEP

      24576:plI/dONx10bIubdwomyYZ/XupouY8DifIFbx9eyarWuOOw5J3OHjE:p6JIazqXupTD8uGyarOeHw

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks