General

  • Target

    aa2ecdddf3ffaf3a4413f80b73e4a0ef_JaffaCakes118

  • Size

    2.7MB

  • Sample

    240819-jpctdsvhpr

  • MD5

    aa2ecdddf3ffaf3a4413f80b73e4a0ef

  • SHA1

    14963273c7bc680c818e860aa44731ff00d53674

  • SHA256

    4dc04185b47f8f49c6ae00c5c2b10eccc75dadea78c8267b34219fc3547dae9b

  • SHA512

    ebc890b54bb25c1b3c7e174fd1aac7da7dc6b9f9cdaba647b4346d63ee33e4315bcfec0a9fccac10c6be8fa11d9de1798349dc5e7d66654df17bc081c0aaa932

  • SSDEEP

    49152:gXa9KQ6R36BezVgvIqLd6GtshcvTCrYxe4xGkQ5:8lDqAzVg3sm2r4Te

Malware Config

Targets

    • Target

      aa2ecdddf3ffaf3a4413f80b73e4a0ef_JaffaCakes118

    • Size

      2.7MB

    • MD5

      aa2ecdddf3ffaf3a4413f80b73e4a0ef

    • SHA1

      14963273c7bc680c818e860aa44731ff00d53674

    • SHA256

      4dc04185b47f8f49c6ae00c5c2b10eccc75dadea78c8267b34219fc3547dae9b

    • SHA512

      ebc890b54bb25c1b3c7e174fd1aac7da7dc6b9f9cdaba647b4346d63ee33e4315bcfec0a9fccac10c6be8fa11d9de1798349dc5e7d66654df17bc081c0aaa932

    • SSDEEP

      49152:gXa9KQ6R36BezVgvIqLd6GtshcvTCrYxe4xGkQ5:8lDqAzVg3sm2r4Te

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks