General

  • Target

    a54e6e84155c69e690a95b05de6e4a65_JaffaCakes118

  • Size

    9.0MB

  • Sample

    240818-ek8m2sthld

  • MD5

    a54e6e84155c69e690a95b05de6e4a65

  • SHA1

    e698c59f970a2742c5fc95c7f48f7bd2a9eda724

  • SHA256

    43b8c8cfc164b5fb60cacb90faf196f5d33e2c04c78a5abdb2010842860ad8bc

  • SHA512

    65a58257ba387cc498438ede54f071a500ca6de1c9af143d3ca42efe844c766d62d3355abbe2835748783b141fe801035578bd03bc810dfa38b9605024b4d73f

  • SSDEEP

    196608:dcyCfrZ0oXNqrPhcj/rkle7+HB3ul3CLUCRqGjTGjuXGjmFdh:dHCzqWjjkle7KB3po5GXGIGiFdh

Malware Config

Targets

    • Target

      a54e6e84155c69e690a95b05de6e4a65_JaffaCakes118

    • Size

      9.0MB

    • MD5

      a54e6e84155c69e690a95b05de6e4a65

    • SHA1

      e698c59f970a2742c5fc95c7f48f7bd2a9eda724

    • SHA256

      43b8c8cfc164b5fb60cacb90faf196f5d33e2c04c78a5abdb2010842860ad8bc

    • SHA512

      65a58257ba387cc498438ede54f071a500ca6de1c9af143d3ca42efe844c766d62d3355abbe2835748783b141fe801035578bd03bc810dfa38b9605024b4d73f

    • SSDEEP

      196608:dcyCfrZ0oXNqrPhcj/rkle7+HB3ul3CLUCRqGjTGjuXGjmFdh:dHCzqWjjkle7KB3po5GXGIGiFdh

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the phone number (MSISDN for GSM devices)

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks