General

  • Target

    990c793ea820d2dce04ae954ff3b668a_JaffaCakes118

  • Size

    11.6MB

  • Sample

    240605-ydkr7age89

  • MD5

    990c793ea820d2dce04ae954ff3b668a

  • SHA1

    38a3441a30927353c052763e17d4cd40e8c16f0d

  • SHA256

    ca5ca7bb26f321bca172429b961b0fde2b0a5a471f0896449914c7c349fa264a

  • SHA512

    e8a5b5406d8d8d690eba299a2a7a7dcfc4f25bd9fa588f4bc3cb24af4e914c5c524eba675185e8d176bf11d54c50771ca8b1fa78af8c4f20977d3392791ef4f8

  • SSDEEP

    196608:GrW7+br+HSzX7y13PhUsFMriJC8gD2CE3NuxZZF08y3x73WW8LTOOczLCxpb6n1d:GlbSHSzGrUcNkFXvnLTvczLCq11yTE

Malware Config

Targets

    • Target

      990c793ea820d2dce04ae954ff3b668a_JaffaCakes118

    • Size

      11.6MB

    • MD5

      990c793ea820d2dce04ae954ff3b668a

    • SHA1

      38a3441a30927353c052763e17d4cd40e8c16f0d

    • SHA256

      ca5ca7bb26f321bca172429b961b0fde2b0a5a471f0896449914c7c349fa264a

    • SHA512

      e8a5b5406d8d8d690eba299a2a7a7dcfc4f25bd9fa588f4bc3cb24af4e914c5c524eba675185e8d176bf11d54c50771ca8b1fa78af8c4f20977d3392791ef4f8

    • SSDEEP

      196608:GrW7+br+HSzX7y13PhUsFMriJC8gD2CE3NuxZZF08y3x73WW8LTOOczLCxpb6n1d:GlbSHSzGrUcNkFXvnLTvczLCq11yTE

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks