General

  • Target

    a7be06bb1eba10dbc966a9520df54f49_JaffaCakes118

  • Size

    17.9MB

  • Sample

    240614-c6c26awdmr

  • MD5

    a7be06bb1eba10dbc966a9520df54f49

  • SHA1

    b2e03cd31620794be16b16c22be5aa08a8204eea

  • SHA256

    724ef3e2314ce8f12cff0a520c39cec0082b19e080f2429be43bc595a440c23c

  • SHA512

    060401825fd868066b2b5c20a4cb3168b7812e61ac55688d22d5e538b73309cb21b7415bf9f38037f91e457a2e810179a0b08935cacb353bcc2ea2b0820b08f1

  • SSDEEP

    393216:Z6jAdZ5D9opbZBIPerHcV+r2tF9YC307gf/dgXRJX94y:Z6jAdXDAZBIPeryF9/Ec2XzXKy

Malware Config

Targets

    • Target

      a7be06bb1eba10dbc966a9520df54f49_JaffaCakes118

    • Size

      17.9MB

    • MD5

      a7be06bb1eba10dbc966a9520df54f49

    • SHA1

      b2e03cd31620794be16b16c22be5aa08a8204eea

    • SHA256

      724ef3e2314ce8f12cff0a520c39cec0082b19e080f2429be43bc595a440c23c

    • SHA512

      060401825fd868066b2b5c20a4cb3168b7812e61ac55688d22d5e538b73309cb21b7415bf9f38037f91e457a2e810179a0b08935cacb353bcc2ea2b0820b08f1

    • SSDEEP

      393216:Z6jAdZ5D9opbZBIPerHcV+r2tF9YC307gf/dgXRJX94y:Z6jAdXDAZBIPeryF9/Ec2XzXKy

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks