General

  • Target

    bb151dfbdcd91319b8122bca4f6c537e_JaffaCakes118

  • Size

    25.6MB

  • Sample

    240618-g3g9xs1bqf

  • MD5

    bb151dfbdcd91319b8122bca4f6c537e

  • SHA1

    994609be03987773df8cb80d2f81c48e33c7f873

  • SHA256

    953e26c9f72f0e49fb36a4bc19a13d0530f69e1dbe6bca26872a415d2c332353

  • SHA512

    dda1146c1d7b37f0f20ec36e4c2759ff1d747101503d588d3667f811e536174a3c2c9d746f75795d41959f93bd403cae3f751a6370cf0f12531055e6e30c0573

  • SSDEEP

    786432:bSmnJJezd8+ZBR+4Qq2zIVEnbmNmRv65zj:b9nJJAd8+t+JoEnbyiC5v

Malware Config

Targets

    • Target

      bb151dfbdcd91319b8122bca4f6c537e_JaffaCakes118

    • Size

      25.6MB

    • MD5

      bb151dfbdcd91319b8122bca4f6c537e

    • SHA1

      994609be03987773df8cb80d2f81c48e33c7f873

    • SHA256

      953e26c9f72f0e49fb36a4bc19a13d0530f69e1dbe6bca26872a415d2c332353

    • SHA512

      dda1146c1d7b37f0f20ec36e4c2759ff1d747101503d588d3667f811e536174a3c2c9d746f75795d41959f93bd403cae3f751a6370cf0f12531055e6e30c0573

    • SSDEEP

      786432:bSmnJJezd8+ZBR+4Qq2zIVEnbmNmRv65zj:b9nJJAd8+t+JoEnbyiC5v

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks