General

  • Target

    db3ef5f8b6722bbba6c350c990416b3e_JaffaCakes118

  • Size

    15.2MB

  • Sample

    240911-1a2bwatepk

  • MD5

    db3ef5f8b6722bbba6c350c990416b3e

  • SHA1

    13d5b8288ba2a42085ba8c80c1ee20cdb7dc84e6

  • SHA256

    b9e672448490e9885cabb493ebfcd956fad0d024b14fdbb6471d5c4f79dbc78a

  • SHA512

    74ab7adefcb61b5ed41136f0a0a26d369dce035108904277d40abf077227c8f2dbd6d9db4f6f64e4b6745def77deeee8c38be06d6b9902ad98ee598397977d50

  • SSDEEP

    393216:NJOgdHkGTGavvm2cvNUr02PAX+1c0hhmWBRtDsSC3ld2xH:agZkG6Cmb8/1c0hhmoC3lgxH

Malware Config

Targets

    • Target

      db3ef5f8b6722bbba6c350c990416b3e_JaffaCakes118

    • Size

      15.2MB

    • MD5

      db3ef5f8b6722bbba6c350c990416b3e

    • SHA1

      13d5b8288ba2a42085ba8c80c1ee20cdb7dc84e6

    • SHA256

      b9e672448490e9885cabb493ebfcd956fad0d024b14fdbb6471d5c4f79dbc78a

    • SHA512

      74ab7adefcb61b5ed41136f0a0a26d369dce035108904277d40abf077227c8f2dbd6d9db4f6f64e4b6745def77deeee8c38be06d6b9902ad98ee598397977d50

    • SSDEEP

      393216:NJOgdHkGTGavvm2cvNUr02PAX+1c0hhmWBRtDsSC3ld2xH:agZkG6Cmb8/1c0hhmoC3lgxH

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks