General

  • Target

    39db98bf76d30804474bb1091c783595_JaffaCakes118

  • Size

    19.2MB

  • Sample

    240711-tr2weathpp

  • MD5

    39db98bf76d30804474bb1091c783595

  • SHA1

    b2918b0b725c917c08f1785e880b09b6693916be

  • SHA256

    37138a9806c7c011ab603ddd57d39802edebdbb8498bca4ac5654cec66a53ce3

  • SHA512

    f70d62fad3c052f868436eb67c48f82cdfadc137cc4ba2e2ebf203bb34b88e40bf7722a39010f6c0c139e6c3d1b3ce1aaf71588ae7d19b20f1da9d95fcf4cc99

  • SSDEEP

    393216:ojjQ9Zy1joIBB1uHRiNkr8scj+r2tF9Ymud3j7gfPdgZ7iiTrx55:ojjQW1oQ2PY9F96TcGZeiT1/

Malware Config

Targets

    • Target

      39db98bf76d30804474bb1091c783595_JaffaCakes118

    • Size

      19.2MB

    • MD5

      39db98bf76d30804474bb1091c783595

    • SHA1

      b2918b0b725c917c08f1785e880b09b6693916be

    • SHA256

      37138a9806c7c011ab603ddd57d39802edebdbb8498bca4ac5654cec66a53ce3

    • SHA512

      f70d62fad3c052f868436eb67c48f82cdfadc137cc4ba2e2ebf203bb34b88e40bf7722a39010f6c0c139e6c3d1b3ce1aaf71588ae7d19b20f1da9d95fcf4cc99

    • SSDEEP

      393216:ojjQ9Zy1joIBB1uHRiNkr8scj+r2tF9Ymud3j7gfPdgZ7iiTrx55:ojjQW1oQ2PY9F96TcGZeiT1/

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks