General

  • Target

    9789d7fe0e5d03ddadf4c54974e48878_JaffaCakes118

  • Size

    17.9MB

  • Sample

    240605-jqwb5aah98

  • MD5

    9789d7fe0e5d03ddadf4c54974e48878

  • SHA1

    859ba70a7e57bc4a9089a05e0e9bf049f7771ba4

  • SHA256

    cb4c4523ac16e1d8928221c3a8dcff8b735ee38666ea664248a5f20ff720cb92

  • SHA512

    022a8a2b74a26a5f91fff6b88ac689b239b82e07a311f02fb4fde8a8713aff867b5154a8affe9b5fb3a4f809d9af32edbbb1be0b2d4640089bcab9f5bdc2f586

  • SSDEEP

    393216:Z6jAdZ5D9opbZBIPerHcV+r2tF9YC307gf/dgXRJX94+:Z6jAdXDAZBIPeryF9/Ec2XzXK+

Malware Config

Targets

    • Target

      9789d7fe0e5d03ddadf4c54974e48878_JaffaCakes118

    • Size

      17.9MB

    • MD5

      9789d7fe0e5d03ddadf4c54974e48878

    • SHA1

      859ba70a7e57bc4a9089a05e0e9bf049f7771ba4

    • SHA256

      cb4c4523ac16e1d8928221c3a8dcff8b735ee38666ea664248a5f20ff720cb92

    • SHA512

      022a8a2b74a26a5f91fff6b88ac689b239b82e07a311f02fb4fde8a8713aff867b5154a8affe9b5fb3a4f809d9af32edbbb1be0b2d4640089bcab9f5bdc2f586

    • SSDEEP

      393216:Z6jAdZ5D9opbZBIPerHcV+r2tF9YC307gf/dgXRJX94+:Z6jAdXDAZBIPeryF9/Ec2XzXK+

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks