General

  • Target

    9585b79cc587efdbc83e53135c2df2e9_JaffaCakes118

  • Size

    8.8MB

  • Sample

    240604-tynblacg5x

  • MD5

    9585b79cc587efdbc83e53135c2df2e9

  • SHA1

    bc6f6f6071136d30b28bfc4dcf4a3b0258c8be92

  • SHA256

    eb621eae974dac483a53c1d189a1fc93e56781e9a193e6d07316777196cc8a57

  • SHA512

    ec59537904c10ca7c874fa517e93d8a630849a869fa06bcedc52d58aace3ac10ce3c05b215bba26f829a15183f1dcf8d644c394721b00a952217d1914776c42e

  • SSDEEP

    196608:DLOJX9zIq8CEW77m9cZuTDbtpOR0Uv7xLaZUa6J/8sJ+p:DKL+2ATTCv8CF3w

Malware Config

Targets

    • Target

      9585b79cc587efdbc83e53135c2df2e9_JaffaCakes118

    • Size

      8.8MB

    • MD5

      9585b79cc587efdbc83e53135c2df2e9

    • SHA1

      bc6f6f6071136d30b28bfc4dcf4a3b0258c8be92

    • SHA256

      eb621eae974dac483a53c1d189a1fc93e56781e9a193e6d07316777196cc8a57

    • SHA512

      ec59537904c10ca7c874fa517e93d8a630849a869fa06bcedc52d58aace3ac10ce3c05b215bba26f829a15183f1dcf8d644c394721b00a952217d1914776c42e

    • SSDEEP

      196608:DLOJX9zIq8CEW77m9cZuTDbtpOR0Uv7xLaZUa6J/8sJ+p:DKL+2ATTCv8CF3w

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Target

      gdtadv2.jar

    • Size

      230KB

    • MD5

      33aeb27eefc5ae7838f01186e27d8816

    • SHA1

      2a7ef64266577916f05cc841c9f977ca8a34568f

    • SHA256

      c6a8f2838c910a50b56bddad227ebed00b8b32a6869a432c83964b1150ad2c59

    • SHA512

      ebd8ccc5750aa1c2a28e849149d0ef3d1c997479008a803a931ea10c82bd99d90797a99329690cbea6cbc18d45bbe481a5576abfe3ca8afc96dbb3974a0e00c5

    • SSDEEP

      6144:B8Obhi9RAdTKqZVGee8QXMLzKb/n4BQk+m:BbhiTAEQeVsWrn4BUm

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks