General

  • Target

    3b2f79fe764223ac02b59d3792034762_JaffaCakes118

  • Size

    7.2MB

  • Sample

    240711-3qq7yssbkb

  • MD5

    3b2f79fe764223ac02b59d3792034762

  • SHA1

    ee90c81affe9ef440507c4186b752827e84ce9d2

  • SHA256

    62bfb163d55007771500547ffb6d7493896d5c6b05032ac569d3b1cd0e2cf3c1

  • SHA512

    8a9568b3517a7fbd15df0e3dbc3016eab705818894299471b666fdc208cb7c2ac09c01f2dac1173c29eb7ce75448e5c9925df875f57b9c0b6b333fb67686ddbc

  • SSDEEP

    196608:xgzgH+6+za7U3pAeimbmpjD+/enzdhiU1rrsOMgXjl:ESqa7U3pAei6mNDWenzdhtrsXu

Malware Config

Targets

    • Target

      3b2f79fe764223ac02b59d3792034762_JaffaCakes118

    • Size

      7.2MB

    • MD5

      3b2f79fe764223ac02b59d3792034762

    • SHA1

      ee90c81affe9ef440507c4186b752827e84ce9d2

    • SHA256

      62bfb163d55007771500547ffb6d7493896d5c6b05032ac569d3b1cd0e2cf3c1

    • SHA512

      8a9568b3517a7fbd15df0e3dbc3016eab705818894299471b666fdc208cb7c2ac09c01f2dac1173c29eb7ce75448e5c9925df875f57b9c0b6b333fb67686ddbc

    • SSDEEP

      196608:xgzgH+6+za7U3pAeimbmpjD+/enzdhiU1rrsOMgXjl:ESqa7U3pAei6mNDWenzdhtrsXu

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks