General

  • Target

    9aaa4b00e863e3301c5b6767a8fa884d_JaffaCakes118

  • Size

    13.0MB

  • Sample

    240610-pmn2javcrb

  • MD5

    9aaa4b00e863e3301c5b6767a8fa884d

  • SHA1

    3144765530875c456d069616e3f6dcea842e9810

  • SHA256

    71e213c5adfe972ff62171686e87937417e426a0edab16c33c836a667e9c5605

  • SHA512

    7dee4d369606458644d876b15cf58df23057bbe8987bee2092b46d2cbe1a98de5bd117afdaad41f6af0c82a49b226e0fb9c6c8a2fb0b4c5ae5f25148cc346ceb

  • SSDEEP

    196608:ZTfFTJfFTw+gr1EkcotAeePU7eEeGrhm740ukTX9MveSttmPzFeiDnw0:9FNF4GkZAXU9Jhm00ukyeVrd

Malware Config

Targets

    • Target

      9aaa4b00e863e3301c5b6767a8fa884d_JaffaCakes118

    • Size

      13.0MB

    • MD5

      9aaa4b00e863e3301c5b6767a8fa884d

    • SHA1

      3144765530875c456d069616e3f6dcea842e9810

    • SHA256

      71e213c5adfe972ff62171686e87937417e426a0edab16c33c836a667e9c5605

    • SHA512

      7dee4d369606458644d876b15cf58df23057bbe8987bee2092b46d2cbe1a98de5bd117afdaad41f6af0c82a49b226e0fb9c6c8a2fb0b4c5ae5f25148cc346ceb

    • SSDEEP

      196608:ZTfFTJfFTw+gr1EkcotAeePU7eEeGrhm740ukTX9MveSttmPzFeiDnw0:9FNF4GkZAXU9Jhm00ukyeVrd

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks