General

  • Target

    9610cf7ad09ab7ad1a12f0a55bcf375b_JaffaCakes118

  • Size

    7.8MB

  • Sample

    240604-ylzlbahe7w

  • MD5

    9610cf7ad09ab7ad1a12f0a55bcf375b

  • SHA1

    99cf2e8f42a687d5dd5741473a8303c2ec391396

  • SHA256

    dca9676cfeebaa665d4787dcefecb636b56c14892afe90687aaebae8a4212953

  • SHA512

    c4e4d465218f5baa06aa08213ba6140b7518338737444bf04319354779c30002895f18e35f3ae01697e30417af4128f0f08990eb0ec1a153fc7b1bb4eedcb3a1

  • SSDEEP

    196608:WCPXJO+ECYEMaAhjmBs1rF8lJ9YQdBh1yW:W4NYpaAhjmBs1rkn71yW

Malware Config

Targets

    • Target

      9610cf7ad09ab7ad1a12f0a55bcf375b_JaffaCakes118

    • Size

      7.8MB

    • MD5

      9610cf7ad09ab7ad1a12f0a55bcf375b

    • SHA1

      99cf2e8f42a687d5dd5741473a8303c2ec391396

    • SHA256

      dca9676cfeebaa665d4787dcefecb636b56c14892afe90687aaebae8a4212953

    • SHA512

      c4e4d465218f5baa06aa08213ba6140b7518338737444bf04319354779c30002895f18e35f3ae01697e30417af4128f0f08990eb0ec1a153fc7b1bb4eedcb3a1

    • SSDEEP

      196608:WCPXJO+ECYEMaAhjmBs1rF8lJ9YQdBh1yW:W4NYpaAhjmBs1rkn71yW

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks