General

  • Target

    694f7d0bc6d74343eab1ceffd67090ce_JaffaCakes118

  • Size

    18.0MB

  • Sample

    240523-b1jgbagh3s

  • MD5

    694f7d0bc6d74343eab1ceffd67090ce

  • SHA1

    c18248daeaae8f59b83b117c14de7bb25b35ae23

  • SHA256

    e9ff46678676202cc9914f3c9afe72cf74c869a02dc52c248c4d55f785b13ab6

  • SHA512

    9c51e4dd3cd86fdfc4f5488521e53790ecd1cd109f933ee0dde1e0b8f5eaec09c1651a3cab002e165e65b7c5529b5b3331bd286d7daa0059247a27d37a7ba1d2

  • SSDEEP

    393216:+NKMf1mAplwBcHUcd+r2tF9Ya3g7gf/dgSRYe3uL:+NKMf0ApyqHLF9Twc2SWeg

Malware Config

Targets

    • Target

      694f7d0bc6d74343eab1ceffd67090ce_JaffaCakes118

    • Size

      18.0MB

    • MD5

      694f7d0bc6d74343eab1ceffd67090ce

    • SHA1

      c18248daeaae8f59b83b117c14de7bb25b35ae23

    • SHA256

      e9ff46678676202cc9914f3c9afe72cf74c869a02dc52c248c4d55f785b13ab6

    • SHA512

      9c51e4dd3cd86fdfc4f5488521e53790ecd1cd109f933ee0dde1e0b8f5eaec09c1651a3cab002e165e65b7c5529b5b3331bd286d7daa0059247a27d37a7ba1d2

    • SSDEEP

      393216:+NKMf1mAplwBcHUcd+r2tF9Ya3g7gf/dgSRYe3uL:+NKMf0ApyqHLF9Twc2SWeg

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks