General

  • Target

    c1649a4213f40083bd58c17e993a5743_JaffaCakes118

  • Size

    20.7MB

  • Sample

    240825-xt3gha1gkq

  • MD5

    c1649a4213f40083bd58c17e993a5743

  • SHA1

    0dc5725a224e87e8f387fcd6789f9aacd2eccc26

  • SHA256

    8416d46bf7bda011964809f36b3f766061de625815d02391aa7ed3f1d83f6eae

  • SHA512

    3aebf30932a0f09d4f732e9918a458d2ae63842a48a48b4b4805ce0372198bd29ceb36d5bcf9e6bfb7e5dff7823d1303ccc526a560077c7bb94466df2cd3e800

  • SSDEEP

    393216:PGgi9ZAlUFrAs1ZRN4LvgsowgBCOWrn4rsYZuFq6PC3WJ73DjrPedMKXe4v9Vgqe:PGgIqUFrA6RN4LcwgFWr4wYwK3M7TPBh

Malware Config

Targets

    • Target

      c1649a4213f40083bd58c17e993a5743_JaffaCakes118

    • Size

      20.7MB

    • MD5

      c1649a4213f40083bd58c17e993a5743

    • SHA1

      0dc5725a224e87e8f387fcd6789f9aacd2eccc26

    • SHA256

      8416d46bf7bda011964809f36b3f766061de625815d02391aa7ed3f1d83f6eae

    • SHA512

      3aebf30932a0f09d4f732e9918a458d2ae63842a48a48b4b4805ce0372198bd29ceb36d5bcf9e6bfb7e5dff7823d1303ccc526a560077c7bb94466df2cd3e800

    • SSDEEP

      393216:PGgi9ZAlUFrAs1ZRN4LvgsowgBCOWrn4rsYZuFq6PC3WJ73DjrPedMKXe4v9Vgqe:PGgIqUFrA6RN4LcwgFWr4wYwK3M7TPBh

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks