General

  • Target

    b4ce447bfbf4a25bc3c96dd0070cad97_JaffaCakes118

  • Size

    3.9MB

  • Sample

    240616-x5p1jsxgql

  • MD5

    b4ce447bfbf4a25bc3c96dd0070cad97

  • SHA1

    d913253957463751d0d896ed2246641b040a0b2b

  • SHA256

    caaf51c1bf91528ca46ebca052cf8cc8c0547437d02c76345ae2a559bc3f889e

  • SHA512

    761ee7f1f41cfadd73e60ed4e2edcb5d55cee3f4d9b882a9630e2fc52531870ab1074368710670d1ec8cd4f0398b3387bb2be337246cd88d4360ed1e475a9937

  • SSDEEP

    98304:mLXr18PPUaxZgLvTNwavu1/y1NWyLmSnUoQQqTc15Oz4E:mLXr18PcaxZwayBLRuTc1g0E

Malware Config

Targets

    • Target

      b4ce447bfbf4a25bc3c96dd0070cad97_JaffaCakes118

    • Size

      3.9MB

    • MD5

      b4ce447bfbf4a25bc3c96dd0070cad97

    • SHA1

      d913253957463751d0d896ed2246641b040a0b2b

    • SHA256

      caaf51c1bf91528ca46ebca052cf8cc8c0547437d02c76345ae2a559bc3f889e

    • SHA512

      761ee7f1f41cfadd73e60ed4e2edcb5d55cee3f4d9b882a9630e2fc52531870ab1074368710670d1ec8cd4f0398b3387bb2be337246cd88d4360ed1e475a9937

    • SSDEEP

      98304:mLXr18PPUaxZgLvTNwavu1/y1NWyLmSnUoQQqTc15Oz4E:mLXr18PcaxZwayBLRuTc1g0E

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks