General

  • Target

    a427f8fde19a40fd2e360647f2d5d6b0_JaffaCakes118

  • Size

    16.5MB

  • Sample

    240613-g1fy3s1dmm

  • MD5

    a427f8fde19a40fd2e360647f2d5d6b0

  • SHA1

    47a8cfe907c0e3df9a0c04cc4609f6e7bca587b6

  • SHA256

    05daeb2bf6e780f702bdf01a88bdb27357dd70a14cd1816ccd5a66148978cbf8

  • SHA512

    ba530919229a7611becb8ae509c18f2a2e44bcecdbc418f15d2062939c18e4f519d673be66165712a69057d183ac5bd7f9902e8268921dcfbc417fb64a6ffa2b

  • SSDEEP

    393216:V2817R4lH0/ijsN7CvczPOGghCJGZL2YiCakiQVgLnGy:0wVvf7CvcjOnhKs2YiFegLGy

Malware Config

Targets

    • Target

      a427f8fde19a40fd2e360647f2d5d6b0_JaffaCakes118

    • Size

      16.5MB

    • MD5

      a427f8fde19a40fd2e360647f2d5d6b0

    • SHA1

      47a8cfe907c0e3df9a0c04cc4609f6e7bca587b6

    • SHA256

      05daeb2bf6e780f702bdf01a88bdb27357dd70a14cd1816ccd5a66148978cbf8

    • SHA512

      ba530919229a7611becb8ae509c18f2a2e44bcecdbc418f15d2062939c18e4f519d673be66165712a69057d183ac5bd7f9902e8268921dcfbc417fb64a6ffa2b

    • SSDEEP

      393216:V2817R4lH0/ijsN7CvczPOGghCJGZL2YiCakiQVgLnGy:0wVvf7CvcjOnhKs2YiFegLGy

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Matrix

Tasks