General

  • Target

    b547eeab822c752b7cf2df732497de45_JaffaCakes118

  • Size

    10.0MB

  • Sample

    240616-z9m3vssfmq

  • MD5

    b547eeab822c752b7cf2df732497de45

  • SHA1

    d9cf21531a9fce3bc62749ac8b2548227df9cb80

  • SHA256

    d062ca8b6f7f8888316e3f786b5fedcb463889b2a752f16936a6379d45189e1f

  • SHA512

    8c6dd2b7ae070589b5f0568719fdc808e91e8ff709bf7218bb60e44faeeb5e120db1606caf0a0b234aaf100ec92c5932b323ae9e07404e6fe134b07e41e1d1c9

  • SSDEEP

    196608:3LHsa4LYuxNYl0ukrfCsMfqXc5UJINc2coiDC7E1dN74iMsGyfal:3LHsa4OqwfqiaINc2jigE1XMhl

Malware Config

Targets

    • Target

      b547eeab822c752b7cf2df732497de45_JaffaCakes118

    • Size

      10.0MB

    • MD5

      b547eeab822c752b7cf2df732497de45

    • SHA1

      d9cf21531a9fce3bc62749ac8b2548227df9cb80

    • SHA256

      d062ca8b6f7f8888316e3f786b5fedcb463889b2a752f16936a6379d45189e1f

    • SHA512

      8c6dd2b7ae070589b5f0568719fdc808e91e8ff709bf7218bb60e44faeeb5e120db1606caf0a0b234aaf100ec92c5932b323ae9e07404e6fe134b07e41e1d1c9

    • SSDEEP

      196608:3LHsa4LYuxNYl0ukrfCsMfqXc5UJINc2coiDC7E1dN74iMsGyfal:3LHsa4OqwfqiaINc2jigE1XMhl

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

    • Checks the presence of a debugger

    • Target

      bdxadsdk.jar

    • Size

      85KB

    • MD5

      3c850ffec5bdd850f123077ca210a411

    • SHA1

      1c1ae4678b8a3b65640f047cb1bd72bc70d66f97

    • SHA256

      516023ce55fff40074d3c3d9016c023b1fc7dfba2b59c172f89141f1484d418e

    • SHA512

      aa3611687b6140ee9214392a84bc1ef55a6425a84a4e413dfcb2e936a931b9015e1e4ec53ad73539d26622427f9e6da0eae5c58ffc18285de42fc15639d786dd

    • SSDEEP

      1536:E4A1vm52J1h/mgxeek9/Ckkf1THL8BNbM/DXO8Q/3yJ463v6hHA0UGcVrSj:e9mkJ1tmg/I/tkdP8sa80O42uXcVrE

    Score
    1/10
    • Target

      gdtadv2.jar

    • Size

      142KB

    • MD5

      f0b930680aa93a62bb77d1916e64a3d7

    • SHA1

      fc30b5641b8d32e4efeaf409d07a4d520a95a6da

    • SHA256

      8f109682334d43d811c7d56620c5eb30c9bc1a89f3f36b91232aeb142a6f6ba7

    • SHA512

      2a503f3aefd5ed8634dbc85cd952d10625e4bc18badc0661c7cfcc3345cfb43ba1e153d9fb264703e4cf0d6c40ac601942e841b9537125072f884c283adb5b99

    • SSDEEP

      3072:mZmii8gAi97ZHbwRILfiNJkAzzBdtCQnm:m8B99TZA/3m

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks