General

  • Target

    dcbaf2c9a505337dc7b76e88f5e60a3f_JaffaCakes118

  • Size

    10.4MB

  • Sample

    240912-v9nxyawcjp

  • MD5

    dcbaf2c9a505337dc7b76e88f5e60a3f

  • SHA1

    3d9c4e5706063798795bd4318fcdf1fe05a9f75f

  • SHA256

    b4021224f94aa43d36f424762db91839b5c8862320d4c6a288926754eba09c4f

  • SHA512

    a6c8cd5ac0302bd9f0ab6cf6e4703022a048db4ee972e98f9d64701633b437ef217370777fbbdadb540114365194b8c487c255e004c1815bae599038faf2937e

  • SSDEEP

    196608:f/JWxA2uFSxGBvwx7yhx/vwFC73HyuoEUExjAJu40gwA:462uoxi7Rj73P1UCjAJuhgV

Malware Config

Targets

    • Target

      dcbaf2c9a505337dc7b76e88f5e60a3f_JaffaCakes118

    • Size

      10.4MB

    • MD5

      dcbaf2c9a505337dc7b76e88f5e60a3f

    • SHA1

      3d9c4e5706063798795bd4318fcdf1fe05a9f75f

    • SHA256

      b4021224f94aa43d36f424762db91839b5c8862320d4c6a288926754eba09c4f

    • SHA512

      a6c8cd5ac0302bd9f0ab6cf6e4703022a048db4ee972e98f9d64701633b437ef217370777fbbdadb540114365194b8c487c255e004c1815bae599038faf2937e

    • SSDEEP

      196608:f/JWxA2uFSxGBvwx7yhx/vwFC73HyuoEUExjAJu40gwA:462uoxi7Rj73P1UCjAJuhgV

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks