General

  • Target

    b549f5fb58b843fa47969efc8396dcf4_JaffaCakes118

  • Size

    22.5MB

  • Sample

    240616-1a4r1asgkj

  • MD5

    b549f5fb58b843fa47969efc8396dcf4

  • SHA1

    01ce03e36a9e44b868b42cba6d3181f7d6110ec4

  • SHA256

    a223becf6ca33f282e2fc05391210bde1161333f0e75818fed740b46057350ab

  • SHA512

    d08c38f73e1a92e251d75176694b94d318960355e3e3067730bdb2feda8b67a3cbeb7fdde6188614b392d2377dc78696521413c62d296ef40721d2190c390a46

  • SSDEEP

    393216:ojjTFDqX2aOBAPOyqvihKf6+XVVBgo8hwQZFOR/WHSUYPMJOd+0SvVlY2KFgJKIj:oRDACGOjvUKf6w4F+/WSPcOPArKFgJKs

Malware Config

Targets

    • Target

      b549f5fb58b843fa47969efc8396dcf4_JaffaCakes118

    • Size

      22.5MB

    • MD5

      b549f5fb58b843fa47969efc8396dcf4

    • SHA1

      01ce03e36a9e44b868b42cba6d3181f7d6110ec4

    • SHA256

      a223becf6ca33f282e2fc05391210bde1161333f0e75818fed740b46057350ab

    • SHA512

      d08c38f73e1a92e251d75176694b94d318960355e3e3067730bdb2feda8b67a3cbeb7fdde6188614b392d2377dc78696521413c62d296ef40721d2190c390a46

    • SSDEEP

      393216:ojjTFDqX2aOBAPOyqvihKf6+XVVBgo8hwQZFOR/WHSUYPMJOd+0SvVlY2KFgJKIj:oRDACGOjvUKf6w4F+/WSPcOPArKFgJKs

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks