General

  • Target

    d625ab276f66723599624bd23930ce2b_JaffaCakes118

  • Size

    3.8MB

  • Sample

    240909-mq8t1atcrk

  • MD5

    d625ab276f66723599624bd23930ce2b

  • SHA1

    eeb2fd3551b3e7e696df98c5c193063cdfe6a838

  • SHA256

    12df3ca2aad84471601dd59e0e08fcd8ba8f551873e318902fe59c8802ff76ab

  • SHA512

    b5f7c8527c14416635d8e6a8ddd4e1b81d64a7535595c134f8edafa8c820f0d726e3a1af6933c4df314b4e55906167a3bed82acdb482801379d73f6f224f7308

  • SSDEEP

    98304:2hytlOiYi9TUTzVfGCJauOaSQyYwBg+Tp9xdJ9lv9mJIPBg/4soK:2hyzOiYi1UTzVfGCJauO9/g+TpndWKkR

Malware Config

Targets

    • Target

      d625ab276f66723599624bd23930ce2b_JaffaCakes118

    • Size

      3.8MB

    • MD5

      d625ab276f66723599624bd23930ce2b

    • SHA1

      eeb2fd3551b3e7e696df98c5c193063cdfe6a838

    • SHA256

      12df3ca2aad84471601dd59e0e08fcd8ba8f551873e318902fe59c8802ff76ab

    • SHA512

      b5f7c8527c14416635d8e6a8ddd4e1b81d64a7535595c134f8edafa8c820f0d726e3a1af6933c4df314b4e55906167a3bed82acdb482801379d73f6f224f7308

    • SSDEEP

      98304:2hytlOiYi9TUTzVfGCJauOaSQyYwBg+Tp9xdJ9lv9mJIPBg/4soK:2hyzOiYi1UTzVfGCJauO9/g+TpndWKkR

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks