General

  • Target

    a960e9d791051d38b60b04fb143b9075_JaffaCakes118

  • Size

    20.1MB

  • Sample

    240614-nbp9saybja

  • MD5

    a960e9d791051d38b60b04fb143b9075

  • SHA1

    bc815210bd27e1e167cd03d755449faed62ec333

  • SHA256

    cf3ac6bcae8a05d9b661c6b22cb256d0f82e15201d31fe2ca67010eb72cb0481

  • SHA512

    840f41d278947f83534264c6d14e2d9ab3c34c53c7eeb84880c01569334e01f9f9334ded77581c94f87a690458e7ed0d7300c180d0adb509a0aac35d80430f49

  • SSDEEP

    393216:KrTVm5CN4qHX8Y8gLivPNJamkmmNGJvKoCaZfnM5i0Ee88An1gGt4PwlrEo:KlFjMY8ZnOj2K+H0EO81VmIF1

Malware Config

Targets

    • Target

      a960e9d791051d38b60b04fb143b9075_JaffaCakes118

    • Size

      20.1MB

    • MD5

      a960e9d791051d38b60b04fb143b9075

    • SHA1

      bc815210bd27e1e167cd03d755449faed62ec333

    • SHA256

      cf3ac6bcae8a05d9b661c6b22cb256d0f82e15201d31fe2ca67010eb72cb0481

    • SHA512

      840f41d278947f83534264c6d14e2d9ab3c34c53c7eeb84880c01569334e01f9f9334ded77581c94f87a690458e7ed0d7300c180d0adb509a0aac35d80430f49

    • SSDEEP

      393216:KrTVm5CN4qHX8Y8gLivPNJamkmmNGJvKoCaZfnM5i0Ee88An1gGt4PwlrEo:KlFjMY8ZnOj2K+H0EO81VmIF1

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks