General

  • Target

    a360edd5a1318b806add45ef0cb37f3c_JaffaCakes118

  • Size

    12.3MB

  • Sample

    240613-byy4zszalf

  • MD5

    a360edd5a1318b806add45ef0cb37f3c

  • SHA1

    27e9e87f328ec69b235051ad0838b8670150b928

  • SHA256

    cb3a67388ae6476faf310d06c51f9fdc52ad271e1f7d7456cefba214520646d5

  • SHA512

    983c00a588c2cf090a9edf6a59b7dfb6c249228335686b504e3fa438a2bd77ac493b16795119baea750da720fc003019ad7bc607dde75a317ab990e7885d7001

  • SSDEEP

    393216:rpScWNBolLCGnClmiIoYGnsPDVnOZPM4Ke/zadSIkFJ:rgnaW7CDqPMa/zadU

Malware Config

Targets

    • Target

      a360edd5a1318b806add45ef0cb37f3c_JaffaCakes118

    • Size

      12.3MB

    • MD5

      a360edd5a1318b806add45ef0cb37f3c

    • SHA1

      27e9e87f328ec69b235051ad0838b8670150b928

    • SHA256

      cb3a67388ae6476faf310d06c51f9fdc52ad271e1f7d7456cefba214520646d5

    • SHA512

      983c00a588c2cf090a9edf6a59b7dfb6c249228335686b504e3fa438a2bd77ac493b16795119baea750da720fc003019ad7bc607dde75a317ab990e7885d7001

    • SSDEEP

      393216:rpScWNBolLCGnClmiIoYGnsPDVnOZPM4Ke/zadSIkFJ:rgnaW7CDqPMa/zadU

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Matrix

Tasks