General

  • Target

    eacaf3b68dc57e0b280f9e4e086a6182_JaffaCakes118

  • Size

    8.6MB

  • Sample

    240919-hmbmwawbma

  • MD5

    eacaf3b68dc57e0b280f9e4e086a6182

  • SHA1

    d541645113fea324dad16564c34d42060438fa93

  • SHA256

    8ff6747322ae1b18f6d3146b76f6440b84bed2da4caba6f14c4ec362463bd725

  • SHA512

    2bd0bf6de5b7b23020698cc38fad9b3bfae06f1e9ff6812e367b52f12c803e59d71ef070456678f1e9c3542d2106c60ae0702378ff8fb6bc5a2007189b0b9d75

  • SSDEEP

    196608:+/ETpht2z9Lr7sUjRN1j4PtsFGep2SF1AqVxe5dsOQD11w7:+/ETF2z1TjbpbvTVCQR1c

Malware Config

Targets

    • Target

      eacaf3b68dc57e0b280f9e4e086a6182_JaffaCakes118

    • Size

      8.6MB

    • MD5

      eacaf3b68dc57e0b280f9e4e086a6182

    • SHA1

      d541645113fea324dad16564c34d42060438fa93

    • SHA256

      8ff6747322ae1b18f6d3146b76f6440b84bed2da4caba6f14c4ec362463bd725

    • SHA512

      2bd0bf6de5b7b23020698cc38fad9b3bfae06f1e9ff6812e367b52f12c803e59d71ef070456678f1e9c3542d2106c60ae0702378ff8fb6bc5a2007189b0b9d75

    • SSDEEP

      196608:+/ETpht2z9Lr7sUjRN1j4PtsFGep2SF1AqVxe5dsOQD11w7:+/ETF2z1TjbpbvTVCQR1c

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks