General

  • Target

    9b29f07e05a7e77f1e73170b280741fc_JaffaCakes118

  • Size

    32.0MB

  • Sample

    240610-sxatfa1epc

  • MD5

    9b29f07e05a7e77f1e73170b280741fc

  • SHA1

    9db172754bb391d7b9f13ad69e61b72ee0571c7f

  • SHA256

    a3684ebf5a9b39d3575cc3839ca5183876a62e9d9ac3c1222477f70323718fd5

  • SHA512

    1b4c76faf74dd8e1bea101d6bb1c5469e01820cbf952645508699147ff35a22216c11977428c6aaca7b08a70ea1d7c57650c8f668f5d8eae6f8dfb5c1f708496

  • SSDEEP

    786432:AvVIVlbi4ZtZBBSzIyEtkmVcGJNi/J8YC3A9YLQGc1SwR74ptPdk:0ulb9ZtbMcXtkQJNi/J8UCs4/K

Malware Config

Targets

    • Target

      9b29f07e05a7e77f1e73170b280741fc_JaffaCakes118

    • Size

      32.0MB

    • MD5

      9b29f07e05a7e77f1e73170b280741fc

    • SHA1

      9db172754bb391d7b9f13ad69e61b72ee0571c7f

    • SHA256

      a3684ebf5a9b39d3575cc3839ca5183876a62e9d9ac3c1222477f70323718fd5

    • SHA512

      1b4c76faf74dd8e1bea101d6bb1c5469e01820cbf952645508699147ff35a22216c11977428c6aaca7b08a70ea1d7c57650c8f668f5d8eae6f8dfb5c1f708496

    • SSDEEP

      786432:AvVIVlbi4ZtZBBSzIyEtkmVcGJNi/J8YC3A9YLQGc1SwR74ptPdk:0ulb9ZtbMcXtkQJNi/J8UCs4/K

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Queries information about active data network

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks