General

  • Target

    365a2b00c2f05164eccbacd3e5a7fafb_JaffaCakes118

  • Size

    6.2MB

  • Sample

    240710-zr88dazbqk

  • MD5

    365a2b00c2f05164eccbacd3e5a7fafb

  • SHA1

    c1c92f23a6e7630addb22dffb78387dfa01b8c65

  • SHA256

    b303856b1d661b4787315fc7abeebd7bbce645465ae41d8e6f43b6faf6171b08

  • SHA512

    453c74c3d037ef8e8be6a56ceb102d3cdb7113d61c723644b3229a9a795b8bdea043543dab0b5e3b409c7a1d3e49fa681bda780c182a267c46f7b48ad74e82ae

  • SSDEEP

    196608:mk/wphI18Rg5Hz7W8wn2AtyPgpYjphjIu:WcdTfItoQY30u

Malware Config

Targets

    • Target

      365a2b00c2f05164eccbacd3e5a7fafb_JaffaCakes118

    • Size

      6.2MB

    • MD5

      365a2b00c2f05164eccbacd3e5a7fafb

    • SHA1

      c1c92f23a6e7630addb22dffb78387dfa01b8c65

    • SHA256

      b303856b1d661b4787315fc7abeebd7bbce645465ae41d8e6f43b6faf6171b08

    • SHA512

      453c74c3d037ef8e8be6a56ceb102d3cdb7113d61c723644b3229a9a795b8bdea043543dab0b5e3b409c7a1d3e49fa681bda780c182a267c46f7b48ad74e82ae

    • SSDEEP

      196608:mk/wphI18Rg5Hz7W8wn2AtyPgpYjphjIu:WcdTfItoQY30u

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks