General

  • Target

    a0f4066b7784a6798d005716509cd0ba_JaffaCakes118

  • Size

    1.7MB

  • Sample

    240612-rjfl4axgre

  • MD5

    a0f4066b7784a6798d005716509cd0ba

  • SHA1

    280cabd8fa5204359bec5bb71a0fcd5f959248d2

  • SHA256

    23dc08c14e92f9e5a15406b4fe4fbbd6fd08907a56357adeee8b209519baf25d

  • SHA512

    6da3e602cdde80e490582973bf2d8c59bba1256241111bed459328cae59e670047da7d02bc929aa1f3b2c222cb14fdc015c81e78ab94e2ad7fb2afd5a140f238

  • SSDEEP

    24576:O4AEoDjuF60QCc3aBIqVPOUI1sixHcJNmE3d+CDjAO02OZGpUgWN17vPUi:foDjuwYTVmUKcBRDEHZXgWN9vP3

Malware Config

Targets

    • Target

      a0f4066b7784a6798d005716509cd0ba_JaffaCakes118

    • Size

      1.7MB

    • MD5

      a0f4066b7784a6798d005716509cd0ba

    • SHA1

      280cabd8fa5204359bec5bb71a0fcd5f959248d2

    • SHA256

      23dc08c14e92f9e5a15406b4fe4fbbd6fd08907a56357adeee8b209519baf25d

    • SHA512

      6da3e602cdde80e490582973bf2d8c59bba1256241111bed459328cae59e670047da7d02bc929aa1f3b2c222cb14fdc015c81e78ab94e2ad7fb2afd5a140f238

    • SSDEEP

      24576:O4AEoDjuF60QCc3aBIqVPOUI1sixHcJNmE3d+CDjAO02OZGpUgWN17vPUi:foDjuwYTVmUKcBRDEHZXgWN9vP3

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of SMS inbox messages.

    • Reads the content of the SMS messages.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Requests dangerous framework permissions

    • Target

      BDTX140

    • Size

      99KB

    • MD5

      3d216f8fddb9705a6720a285475837f1

    • SHA1

      f053d23b284bfe2faf6e76d353ff052471e2de2c

    • SHA256

      de7bf40574754a5144fa5cf3bc5e97f7adc7f5abebb18c41e8f0631917db4c0c

    • SHA512

      38be39da8f96abc87109cfd57b2d63ddfa72971f023024a5b4ce1f97cd905a96a94e19eea19ae9b745f28d02c6689a4473627ce57ec85dce2018a77e699620cb

    • SSDEEP

      3072:O/hr91fY/9tdWXLqQRClwYJ4sAAq4/IZn8NxQNRmDJS:2B9NMDGLqofsAAbNI8g

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks