General

  • Target

    0d6de13394efc4cb03959454c48b49dc_JaffaCakes118

  • Size

    8.0MB

  • Sample

    240728-hm885stdpp

  • MD5

    0d6de13394efc4cb03959454c48b49dc

  • SHA1

    7ac0488cb2479b0051b0ef1c2d5c2a0e6911497a

  • SHA256

    48d6e3eab1db452c8ce06895827044c3c7be19091ce74016146131dffc3acc85

  • SHA512

    1ce8b56a14d26a9b100f6d66432c631e590986c6ca197780b91cd495e5a32c584ce50c42942bb0a182b05915ab9404244b6c77fd2ace0f61d527984549861288

  • SSDEEP

    196608:OuM2r2ziokc8DhYz7bk3eFmc/HMTEhT49FnwhAVBJ:OWDoYDhu7bk3eFmc/HqIT6OArJ

Malware Config

Targets

    • Target

      0d6de13394efc4cb03959454c48b49dc_JaffaCakes118

    • Size

      8.0MB

    • MD5

      0d6de13394efc4cb03959454c48b49dc

    • SHA1

      7ac0488cb2479b0051b0ef1c2d5c2a0e6911497a

    • SHA256

      48d6e3eab1db452c8ce06895827044c3c7be19091ce74016146131dffc3acc85

    • SHA512

      1ce8b56a14d26a9b100f6d66432c631e590986c6ca197780b91cd495e5a32c584ce50c42942bb0a182b05915ab9404244b6c77fd2ace0f61d527984549861288

    • SSDEEP

      196608:OuM2r2ziokc8DhYz7bk3eFmc/HMTEhT49FnwhAVBJ:OWDoYDhu7bk3eFmc/HqIT6OArJ

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Acquires the wake lock

    • Queries information about active data network

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks