General

  • Target

    a6083ffc347044a508389f808582ab3e_JaffaCakes118

  • Size

    17.9MB

  • Sample

    240613-rvkp7asgjh

  • MD5

    a6083ffc347044a508389f808582ab3e

  • SHA1

    c6ffbb232c86b0346f60ba753215334a61590352

  • SHA256

    c4475c1d5e4189613ef9a96b50fb180fbcce30b5bb4cf0267c312057c73ef7d5

  • SHA512

    a9e7962ae7c5ba69f83aff026460fedb54cb7a18a6b8046e57bbcd2d2de3a5251c99168a1ef2d2e33b438e83ff82f7349032d9a3720e60caa92ea5025dfd5fbd

  • SSDEEP

    393216:Z6jAdZ5D9opbZBIPerHcV+r2tF9YC307gf/dgXRJX94Q:Z6jAdXDAZBIPeryF9/Ec2XzXKQ

Malware Config

Targets

    • Target

      a6083ffc347044a508389f808582ab3e_JaffaCakes118

    • Size

      17.9MB

    • MD5

      a6083ffc347044a508389f808582ab3e

    • SHA1

      c6ffbb232c86b0346f60ba753215334a61590352

    • SHA256

      c4475c1d5e4189613ef9a96b50fb180fbcce30b5bb4cf0267c312057c73ef7d5

    • SHA512

      a9e7962ae7c5ba69f83aff026460fedb54cb7a18a6b8046e57bbcd2d2de3a5251c99168a1ef2d2e33b438e83ff82f7349032d9a3720e60caa92ea5025dfd5fbd

    • SSDEEP

      393216:Z6jAdZ5D9opbZBIPerHcV+r2tF9YC307gf/dgXRJX94Q:Z6jAdXDAZBIPeryF9/Ec2XzXKQ

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks