General

  • Target

    9990008a86566c400661d12372e1b957_JaffaCakes118

  • Size

    23.6MB

  • Sample

    240605-3wxa6acb9z

  • MD5

    9990008a86566c400661d12372e1b957

  • SHA1

    d2e45d9118b0184e0f232760ed4ceb3b710c6155

  • SHA256

    1aa9021999f4f916ee4aaa41b4a0352b2c31f22753431b243debb7a364aee99b

  • SHA512

    8639e85e27ac67e032c87e5842cebc74f1777fa810ddf6f5b903348bb76f26396c44173dca17b3e3753fd9013b23b155cf66e41693f492097b909798071c2852

  • SSDEEP

    393216:1MYWWyeTTSl0kUYkOi3pOtPy0e6YdEsVYxHNAF/GTnqFexS59f8T2qo6SBq7sTSs:6fenW0kNNqH0e12s2yFOqFji2qF+e2Ss

Malware Config

Targets

    • Target

      9990008a86566c400661d12372e1b957_JaffaCakes118

    • Size

      23.6MB

    • MD5

      9990008a86566c400661d12372e1b957

    • SHA1

      d2e45d9118b0184e0f232760ed4ceb3b710c6155

    • SHA256

      1aa9021999f4f916ee4aaa41b4a0352b2c31f22753431b243debb7a364aee99b

    • SHA512

      8639e85e27ac67e032c87e5842cebc74f1777fa810ddf6f5b903348bb76f26396c44173dca17b3e3753fd9013b23b155cf66e41693f492097b909798071c2852

    • SSDEEP

      393216:1MYWWyeTTSl0kUYkOi3pOtPy0e6YdEsVYxHNAF/GTnqFexS59f8T2qo6SBq7sTSs:6fenW0kNNqH0e12s2yFOqFji2qF+e2Ss

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks