General

  • Target

    aa48e7b4126ba1c873571eda6c3e3d42_JaffaCakes118

  • Size

    30.7MB

  • Sample

    240614-sakecsvgmd

  • MD5

    aa48e7b4126ba1c873571eda6c3e3d42

  • SHA1

    404f2dbee7a626ee5214d870f47354f896796fb0

  • SHA256

    fdcd6e795da657cd7f9383c96a50400d4f4711ca39e483a48cdff2621f5178c7

  • SHA512

    d7df8a57d5f873937eeaf83d5595f7c47cc0c17685098206a1241488d25f573f64bdf3b1bbfcb2fd0500b837fb6b9405fa426dbb81c1ef8a5d4ae022231f0593

  • SSDEEP

    786432:l0uukq7sPhQuOMaOXRbLuqpNLygM0H/LGVKOKxxLO1:CuDQVGXRbLuqpNHD6ey1

Malware Config

Targets

    • Target

      aa48e7b4126ba1c873571eda6c3e3d42_JaffaCakes118

    • Size

      30.7MB

    • MD5

      aa48e7b4126ba1c873571eda6c3e3d42

    • SHA1

      404f2dbee7a626ee5214d870f47354f896796fb0

    • SHA256

      fdcd6e795da657cd7f9383c96a50400d4f4711ca39e483a48cdff2621f5178c7

    • SHA512

      d7df8a57d5f873937eeaf83d5595f7c47cc0c17685098206a1241488d25f573f64bdf3b1bbfcb2fd0500b837fb6b9405fa426dbb81c1ef8a5d4ae022231f0593

    • SSDEEP

      786432:l0uukq7sPhQuOMaOXRbLuqpNLygM0H/LGVKOKxxLO1:CuDQVGXRbLuqpNHD6ey1

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Target

      a.b.c.d.e.cache.jar

    • Size

      31KB

    • MD5

      82e95643221bd49928a85d8960088e94

    • SHA1

      18aeb5282e46d3ca6b4280ef3f972c6c9d447256

    • SHA256

      e4fa449a63b98ba6e6b9b0801c727371fb3552232920a5b7ea91a37d32afe147

    • SHA512

      4da607f2ad08a33c2da3fa6784a2543169f5849999c89c0d33f448a9ffb177c35804569500ade9d08ca700a3e3a3b51aceb2fe6af8b4a64d9d1b4ee9ae40e6b4

    • SSDEEP

      768:vFBxNF66DSmzK82daaEkDNfi3C9ub7Jrn3S0YbmS4qJz2:vFnb/DDUEMaSm9n3S0YbmSn8

    Score
    1/10
    • Target

      a.b.c.d.e.jar

    • Size

      83KB

    • MD5

      301cebffcfd9405fcbf67b851c22655d

    • SHA1

      5ed5f2c21ae3d7141953f81c4f642ada82f801a2

    • SHA256

      e51d9f4f9f55e1a3c9592ba09d9928ead3a41b9658c0fcbb06bb46c3176b1d81

    • SHA512

      51dabd63fc9e58e70d9de4dd2be10d7e0e7d3c78451192a547f436378546785b8071f631c0eb95910512d705caa8c0212a9c9b346a639480eb01c2e2ebea505f

    • SSDEEP

      1536:JMlaR5POzLDGRMuEGuNckdfMImOuRINmtQoerjKrGcUV75pih24:6lEO6RzNplsjUGcUJ58b

    Score
    1/10

MITRE ATT&CK Matrix

Tasks