General

  • Target

    6594698a3d113b47fe50658abb118830_JaffaCakes118

  • Size

    7.8MB

  • Sample

    240522-b8mhyage38

  • MD5

    6594698a3d113b47fe50658abb118830

  • SHA1

    7bc02f067a9079a32c042484bb6bf261f149c712

  • SHA256

    8bffc3a03bcacc0530a4752a7b5509ce4473d8b7e2810f978cf3aebe28e4dcb8

  • SHA512

    a4ddeb96447c46c7b87aebdc213706e7dcd18556724968aa5bb4810db2467694549e9839a40088d9a1ba7305e4bf10ff1d58bc1f86fc5f7e983e7f1041960eac

  • SSDEEP

    196608:8oSao/gNnAuyGjW2Zgtlc4TiSzzNrC5bKcbYBDeaLn:mX/g/QtOwXZrHl5D

Malware Config

Targets

    • Target

      6594698a3d113b47fe50658abb118830_JaffaCakes118

    • Size

      7.8MB

    • MD5

      6594698a3d113b47fe50658abb118830

    • SHA1

      7bc02f067a9079a32c042484bb6bf261f149c712

    • SHA256

      8bffc3a03bcacc0530a4752a7b5509ce4473d8b7e2810f978cf3aebe28e4dcb8

    • SHA512

      a4ddeb96447c46c7b87aebdc213706e7dcd18556724968aa5bb4810db2467694549e9839a40088d9a1ba7305e4bf10ff1d58bc1f86fc5f7e983e7f1041960eac

    • SSDEEP

      196608:8oSao/gNnAuyGjW2Zgtlc4TiSzzNrC5bKcbYBDeaLn:mX/g/QtOwXZrHl5D

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks