General

  • Target

    a7dcee88aff81642d47b28fee29b3319_JaffaCakes118

  • Size

    8.7MB

  • Sample

    240818-xtgj2ayhra

  • MD5

    a7dcee88aff81642d47b28fee29b3319

  • SHA1

    78866dce78055cfc48640a93901939b71252f563

  • SHA256

    ca90aec53f14794b3b8867f6ef3180ed69c4f0cd25cb4b4dcd2ff0a252eec844

  • SHA512

    2cb1ac1f241652429747dc5dc15c639e3d1e3e68fb01ff8515b0ccccc214f734b87f43577bcb1e3c1e7b0d551bc85ab24b56a9dad2117f6b2e71f3bceb729a07

  • SSDEEP

    196608:nj7TQ2YTCXeDh8/u44SQpXVj0AHF0EynHFVO+zoTa6:j782MCX81pXuO0PHFVSe6

Malware Config

Targets

    • Target

      a7dcee88aff81642d47b28fee29b3319_JaffaCakes118

    • Size

      8.7MB

    • MD5

      a7dcee88aff81642d47b28fee29b3319

    • SHA1

      78866dce78055cfc48640a93901939b71252f563

    • SHA256

      ca90aec53f14794b3b8867f6ef3180ed69c4f0cd25cb4b4dcd2ff0a252eec844

    • SHA512

      2cb1ac1f241652429747dc5dc15c639e3d1e3e68fb01ff8515b0ccccc214f734b87f43577bcb1e3c1e7b0d551bc85ab24b56a9dad2117f6b2e71f3bceb729a07

    • SSDEEP

      196608:nj7TQ2YTCXeDh8/u44SQpXVj0AHF0EynHFVO+zoTa6:j782MCX81pXuO0PHFVSe6

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks