General

  • Target

    bdbd84436cc1689afae8f2a57e42ed2b_JaffaCakes118

  • Size

    17.2MB

  • Sample

    240824-bs5dtazfpl

  • MD5

    bdbd84436cc1689afae8f2a57e42ed2b

  • SHA1

    fa2a3eeecda37831d0558a7abd8326247e5d8ae8

  • SHA256

    15795d89207dde3b96a5a7ec8602e76a8f0ab54ee4097d8bfb39bd2e227d3f41

  • SHA512

    99da388ba97679d04c73e5d572068d3941f1e266923ac1da5166be19082540f8618c16be8d467189cbc2749c0be28218223e42894cc8d7a51eceb4d45541bc58

  • SSDEEP

    393216:wYmUW+u1oyMiVp5AQjMpGoo0aVKSqc+EftB5sPjdtAl1J0:9mUlyoyMiJF31VKZqUXF

Malware Config

Targets

    • Target

      bdbd84436cc1689afae8f2a57e42ed2b_JaffaCakes118

    • Size

      17.2MB

    • MD5

      bdbd84436cc1689afae8f2a57e42ed2b

    • SHA1

      fa2a3eeecda37831d0558a7abd8326247e5d8ae8

    • SHA256

      15795d89207dde3b96a5a7ec8602e76a8f0ab54ee4097d8bfb39bd2e227d3f41

    • SHA512

      99da388ba97679d04c73e5d572068d3941f1e266923ac1da5166be19082540f8618c16be8d467189cbc2749c0be28218223e42894cc8d7a51eceb4d45541bc58

    • SSDEEP

      393216:wYmUW+u1oyMiVp5AQjMpGoo0aVKSqc+EftB5sPjdtAl1J0:9mUlyoyMiJF31VKZqUXF

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks