General

  • Target

    a81dfe05dece00e06ef0608c5319d6fa_JaffaCakes118

  • Size

    1.6MB

  • Sample

    240614-fwj99szfmq

  • MD5

    a81dfe05dece00e06ef0608c5319d6fa

  • SHA1

    3bf1fc30bfd8007495afe4c54fdd70f32a6feadf

  • SHA256

    324f8c5efc58116b27f66c7a2a6fc005e5ad95456d33722064ff22b743e1687a

  • SHA512

    bb131a5d56ae61ed88c96c32ae1ea17e975129bc51c94b0e4ab3ac472f1440436aed36541a88d5b7a25a340aee70f1c485cf876dc55018486da6053a306b792c

  • SSDEEP

    24576:K0DR/V+CDjORXMWp4p4V8kT2cj3AwtGjkcoyqY+8t9xOnd3pL7YLEqlEK1kiE:XhDSRXtL8kv3dtGoco729xa7ytl9GiE

Malware Config

Targets

    • Target

      a81dfe05dece00e06ef0608c5319d6fa_JaffaCakes118

    • Size

      1.6MB

    • MD5

      a81dfe05dece00e06ef0608c5319d6fa

    • SHA1

      3bf1fc30bfd8007495afe4c54fdd70f32a6feadf

    • SHA256

      324f8c5efc58116b27f66c7a2a6fc005e5ad95456d33722064ff22b743e1687a

    • SHA512

      bb131a5d56ae61ed88c96c32ae1ea17e975129bc51c94b0e4ab3ac472f1440436aed36541a88d5b7a25a340aee70f1c485cf876dc55018486da6053a306b792c

    • SSDEEP

      24576:K0DR/V+CDjORXMWp4p4V8kT2cj3AwtGjkcoyqY+8t9xOnd3pL7YLEqlEK1kiE:XhDSRXtL8kv3dtGoco729xa7ytl9GiE

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads the content of SMS inbox messages.

    • Reads the content of the SMS messages.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Requests dangerous framework permissions

MITRE ATT&CK Matrix

Tasks