General

  • Target

    dd4f3e19ae9fa2cf8cd54c59aa3af0b2_JaffaCakes118

  • Size

    11.5MB

  • Sample

    240913-amrebsthld

  • MD5

    dd4f3e19ae9fa2cf8cd54c59aa3af0b2

  • SHA1

    e53492ef5511c41fd571986a109be74e32145c31

  • SHA256

    4b26d9a6f32936acb6324d276e113ffe43c937e1001daae11bb30da32176edb2

  • SHA512

    e7df01c6f8d022044838707ee4ffd8f45ad95b89cf6bbe30af4775b2946a4e135a50b99742b7c45ced99c49ddc3356be645cbf896e2f3fd73a51beaf9606fd04

  • SSDEEP

    196608:AfCftdOL9c3EE1sOzz8JDoQ2XcdqCbZYu6Kbg4L0cEEY8Xa5Pw/FLZtIUSdLs4wg:AfC1dO5gsc32dqxu6wgnEXFb2dLs4w3Q

Malware Config

Targets

    • Target

      dd4f3e19ae9fa2cf8cd54c59aa3af0b2_JaffaCakes118

    • Size

      11.5MB

    • MD5

      dd4f3e19ae9fa2cf8cd54c59aa3af0b2

    • SHA1

      e53492ef5511c41fd571986a109be74e32145c31

    • SHA256

      4b26d9a6f32936acb6324d276e113ffe43c937e1001daae11bb30da32176edb2

    • SHA512

      e7df01c6f8d022044838707ee4ffd8f45ad95b89cf6bbe30af4775b2946a4e135a50b99742b7c45ced99c49ddc3356be645cbf896e2f3fd73a51beaf9606fd04

    • SSDEEP

      196608:AfCftdOL9c3EE1sOzz8JDoQ2XcdqCbZYu6Kbg4L0cEEY8Xa5Pw/FLZtIUSdLs4wg:AfC1dO5gsc32dqxu6wgnEXFb2dLs4w3Q

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks