General

  • Target

    a8d1b0502539b103f6bba69b930b89bc_JaffaCakes118

  • Size

    21.9MB

  • Sample

    240614-kshdqaxblp

  • MD5

    a8d1b0502539b103f6bba69b930b89bc

  • SHA1

    37e15efa648f5da72fe05e3b024301c50db2a8cc

  • SHA256

    d5bbd1c0f6ee2672e570da071264931cee829d4b0a4556c506f0dddd6eb0f61a

  • SHA512

    91586f1b706f22c421ecf4f66c5d63af84f2d2ccc85df05b0f3835b8ef1ff594d321491af48ec2285145b256a4fe72383b31717298d7aa52b4f3516d8d915e6d

  • SSDEEP

    393216:9noWIyYuaJj9chq4shY2MlrhyzO4BW1w1Vi9wGpnU7FXXx/znX5GdaQ5vMWEoXMi:9d/aF9p4IY2MZhyzO4BWSctpMFXXhznO

Malware Config

Targets

    • Target

      a8d1b0502539b103f6bba69b930b89bc_JaffaCakes118

    • Size

      21.9MB

    • MD5

      a8d1b0502539b103f6bba69b930b89bc

    • SHA1

      37e15efa648f5da72fe05e3b024301c50db2a8cc

    • SHA256

      d5bbd1c0f6ee2672e570da071264931cee829d4b0a4556c506f0dddd6eb0f61a

    • SHA512

      91586f1b706f22c421ecf4f66c5d63af84f2d2ccc85df05b0f3835b8ef1ff594d321491af48ec2285145b256a4fe72383b31717298d7aa52b4f3516d8d915e6d

    • SSDEEP

      393216:9noWIyYuaJj9chq4shY2MlrhyzO4BW1w1Vi9wGpnU7FXXx/znX5GdaQ5vMWEoXMi:9d/aF9p4IY2MZhyzO4BWSctpMFXXhznO

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks