General

  • Target

    a7cb2974fde9d0bd33f1192698e983b5_JaffaCakes118

  • Size

    30.9MB

  • Sample

    240614-dkqlssshke

  • MD5

    a7cb2974fde9d0bd33f1192698e983b5

  • SHA1

    9a9b43fcbc3028b91dc0fa1d15d6662ccf70426d

  • SHA256

    164b1101bfeeba4be6c6ef70b0999f5850374cab220ca3e663a6bfe07d6b86d2

  • SHA512

    71667682e6a817b3a179452ab62fc21f017ecf6e6cdf384b0c026e50eaddd0916f9a3a529dc733b8bb3b95f84fe7a5390329bfef9d1b114dc64d8d33f50e7105

  • SSDEEP

    786432:7kGw70jugoVgNN9v/sQbtvsk1nXZ2fVKMwCTEz1EtDO7Yxj:7lw70igoVk0Jkn29KME1E+Mj

Malware Config

Targets

    • Target

      a7cb2974fde9d0bd33f1192698e983b5_JaffaCakes118

    • Size

      30.9MB

    • MD5

      a7cb2974fde9d0bd33f1192698e983b5

    • SHA1

      9a9b43fcbc3028b91dc0fa1d15d6662ccf70426d

    • SHA256

      164b1101bfeeba4be6c6ef70b0999f5850374cab220ca3e663a6bfe07d6b86d2

    • SHA512

      71667682e6a817b3a179452ab62fc21f017ecf6e6cdf384b0c026e50eaddd0916f9a3a529dc733b8bb3b95f84fe7a5390329bfef9d1b114dc64d8d33f50e7105

    • SSDEEP

      786432:7kGw70jugoVgNN9v/sQbtvsk1nXZ2fVKMwCTEz1EtDO7Yxj:7lw70igoVk0Jkn29KME1E+Mj

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks