General

  • Target

    adf1ce04a81a7e794ccd01d83d9eec0f_JaffaCakes118

  • Size

    19.5MB

  • Sample

    240615-madnxswhqe

  • MD5

    adf1ce04a81a7e794ccd01d83d9eec0f

  • SHA1

    1b227fff1fde118c3c7efe96bc46c9903098c4ec

  • SHA256

    821d0ef3501ab513d2fa57c7fc500e89ce1c9366dae6e97d2938b2dc224c0984

  • SHA512

    dcfaa307fb6001289726b7cdd3331cd794ead34af27d36651cd48b3df6e208f53459a0bf5be75dd0c9ee2a2b1df0c85090550ecb136d95f63378e08078db37a3

  • SSDEEP

    393216:7jjNqeHH/k+kHXw1idNiGLE0cy+r2tF9Ymud3tS7gf/dgTRGF73:7jjK+kH5uG4SF9C8c2TAh

Malware Config

Targets

    • Target

      adf1ce04a81a7e794ccd01d83d9eec0f_JaffaCakes118

    • Size

      19.5MB

    • MD5

      adf1ce04a81a7e794ccd01d83d9eec0f

    • SHA1

      1b227fff1fde118c3c7efe96bc46c9903098c4ec

    • SHA256

      821d0ef3501ab513d2fa57c7fc500e89ce1c9366dae6e97d2938b2dc224c0984

    • SHA512

      dcfaa307fb6001289726b7cdd3331cd794ead34af27d36651cd48b3df6e208f53459a0bf5be75dd0c9ee2a2b1df0c85090550ecb136d95f63378e08078db37a3

    • SSDEEP

      393216:7jjNqeHH/k+kHXw1idNiGLE0cy+r2tF9Ymud3tS7gf/dgTRGF73:7jjK+kH5uG4SF9C8c2TAh

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks