General

  • Target

    a7290f583b7ad5a960f1da6e5d02796d_JaffaCakes118

  • Size

    5.4MB

  • Sample

    240613-3rmk6awcjd

  • MD5

    a7290f583b7ad5a960f1da6e5d02796d

  • SHA1

    f2b3a1d61e508f480319b8f6df555cbac2dd242a

  • SHA256

    baa630bc3288cb1146c12af9e6016831f73570017ca6fe586810f22ae972f8c6

  • SHA512

    d4f39b2a24914c77fbc1fcc86dc68f1ca400f58fc918bc033d4cd37ee394392c439e315a0d0f56525cf45c33b42a69f9b03998128b03f22df20408465938e009

  • SSDEEP

    98304:qhytlO9Yi9iUTzVfGDqpGfrvyk3jpcbTtJ+iFge13g0m7BW:qhyzO9Yi4UTzVfGOpor6kVO+iFge13gs

Malware Config

Targets

    • Target

      a7290f583b7ad5a960f1da6e5d02796d_JaffaCakes118

    • Size

      5.4MB

    • MD5

      a7290f583b7ad5a960f1da6e5d02796d

    • SHA1

      f2b3a1d61e508f480319b8f6df555cbac2dd242a

    • SHA256

      baa630bc3288cb1146c12af9e6016831f73570017ca6fe586810f22ae972f8c6

    • SHA512

      d4f39b2a24914c77fbc1fcc86dc68f1ca400f58fc918bc033d4cd37ee394392c439e315a0d0f56525cf45c33b42a69f9b03998128b03f22df20408465938e009

    • SSDEEP

      98304:qhytlO9Yi9iUTzVfGDqpGfrvyk3jpcbTtJ+iFge13g0m7BW:qhyzO9Yi4UTzVfGOpor6kVO+iFge13gs

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks