General

  • Target

    844ce7ada77a1cbeece4472a54aac4cb_JaffaCakes118

  • Size

    13.9MB

  • Sample

    240530-qnhftaaa6z

  • MD5

    844ce7ada77a1cbeece4472a54aac4cb

  • SHA1

    65463135f1d27b4e29416dd5f1afd6fae60f23a1

  • SHA256

    694be2c9cfcf330e5c3c9001c319a8ad3da20fe9288eb49335e046469b5bbd00

  • SHA512

    b9a15d99fe3896c6b7e76036e557114229ecfe868dd273d2a49c1c3ae914ed416b5d0a920ee3ef39b4113f94cf651e26ce8d603a43f3a5f8b7c21a1cb8ff6a57

  • SSDEEP

    393216:4XaL4w5gufGCgtHvYGzcADfZf5vWq97E82qWqd:6aMwuuOCSvYqc6l5v5oQ

Malware Config

Targets

    • Target

      844ce7ada77a1cbeece4472a54aac4cb_JaffaCakes118

    • Size

      13.9MB

    • MD5

      844ce7ada77a1cbeece4472a54aac4cb

    • SHA1

      65463135f1d27b4e29416dd5f1afd6fae60f23a1

    • SHA256

      694be2c9cfcf330e5c3c9001c319a8ad3da20fe9288eb49335e046469b5bbd00

    • SHA512

      b9a15d99fe3896c6b7e76036e557114229ecfe868dd273d2a49c1c3ae914ed416b5d0a920ee3ef39b4113f94cf651e26ce8d603a43f3a5f8b7c21a1cb8ff6a57

    • SSDEEP

      393216:4XaL4w5gufGCgtHvYGzcADfZf5vWq97E82qWqd:6aMwuuOCSvYqc6l5v5oQ

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Checks if the internet connection is available

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks