General

  • Target

    db4f17529b419b665b7e0c8404bb8e5f_JaffaCakes118

  • Size

    20.2MB

  • Sample

    240911-14cwdaweje

  • MD5

    db4f17529b419b665b7e0c8404bb8e5f

  • SHA1

    f79f8bad1e521ce74a53695e59f41b8d61c3ee98

  • SHA256

    3a7be3619268ada968526137eb4afd9373ae60be134236ede912570ef372c9db

  • SHA512

    3d63d0945fd55e7a6d8cba8d05d5405a4f3e7c79c87a084309576e6cb42fbe1008c209f3101bae36ad9841d98dca60b9e22c354908c9378e743d3cad9c58e786

  • SSDEEP

    393216:5RhZgk4vIIP17c7RoUYerN830JuS7pUcxKaf+OnXJ4Bxbkm3eOwt:5R/34vzICUnrLmQdnaxWjt

Malware Config

Targets

    • Target

      db4f17529b419b665b7e0c8404bb8e5f_JaffaCakes118

    • Size

      20.2MB

    • MD5

      db4f17529b419b665b7e0c8404bb8e5f

    • SHA1

      f79f8bad1e521ce74a53695e59f41b8d61c3ee98

    • SHA256

      3a7be3619268ada968526137eb4afd9373ae60be134236ede912570ef372c9db

    • SHA512

      3d63d0945fd55e7a6d8cba8d05d5405a4f3e7c79c87a084309576e6cb42fbe1008c209f3101bae36ad9841d98dca60b9e22c354908c9378e743d3cad9c58e786

    • SSDEEP

      393216:5RhZgk4vIIP17c7RoUYerN830JuS7pUcxKaf+OnXJ4Bxbkm3eOwt:5R/34vzICUnrLmQdnaxWjt

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks