General

  • Target

    b54b3d76828c0fc7c7cb18cacf0b4f42_JaffaCakes118

  • Size

    30.5MB

  • Sample

    240616-1b8scayfjd

  • MD5

    b54b3d76828c0fc7c7cb18cacf0b4f42

  • SHA1

    c6522d3370c56f2d62ef30c20ca0b0d7c6360fe5

  • SHA256

    b2be65f2eb5f3b9ecdc3a9b1c3c1460ef1ff970f4a046524bdb6fd85b5faeab1

  • SHA512

    cd1d024556f20f17bf3a6cf8b287639abb498cccbcfac55f6847f21b5427ec9e83f8c98d8981749af759a8f4ed7e9f7994a403d3db5adc52c533f0dcfdf42750

  • SSDEEP

    786432:9QO91I7cl2Mzemvo7700pUJRLcpAiEnJH6J:KOz9lQ77BOcsE

Malware Config

Targets

    • Target

      b54b3d76828c0fc7c7cb18cacf0b4f42_JaffaCakes118

    • Size

      30.5MB

    • MD5

      b54b3d76828c0fc7c7cb18cacf0b4f42

    • SHA1

      c6522d3370c56f2d62ef30c20ca0b0d7c6360fe5

    • SHA256

      b2be65f2eb5f3b9ecdc3a9b1c3c1460ef1ff970f4a046524bdb6fd85b5faeab1

    • SHA512

      cd1d024556f20f17bf3a6cf8b287639abb498cccbcfac55f6847f21b5427ec9e83f8c98d8981749af759a8f4ed7e9f7994a403d3db5adc52c533f0dcfdf42750

    • SSDEEP

      786432:9QO91I7cl2Mzemvo7700pUJRLcpAiEnJH6J:KOz9lQ77BOcsE

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks