General

  • Target

    ebf25c3943ba14cf347b883bc05d70fc_JaffaCakes118

  • Size

    15.5MB

  • Sample

    240919-w5564atfpr

  • MD5

    ebf25c3943ba14cf347b883bc05d70fc

  • SHA1

    2579a5b86c70c30de1f13db2357c5cbab396e941

  • SHA256

    dd3442a269fbd53de977b47103fb9af8332e6b2727becbe66041f27e14d3486f

  • SHA512

    4090aade6b870fa888faf84cbcd1264cd388904bf67442942a92c2efe08f4c9981cdb0fec1d3eae6baa170ccd5d198190dc6e8361c98b5347e9fade1d46b2bfd

  • SSDEEP

    393216:tuY0fY/QmvY8L5gTI60ZiQwslZzbDG69+xDI6Hdx2ka+uhQ:tu1qQmvATyLrlZzWLjHj2xe

Malware Config

Targets

    • Target

      ebf25c3943ba14cf347b883bc05d70fc_JaffaCakes118

    • Size

      15.5MB

    • MD5

      ebf25c3943ba14cf347b883bc05d70fc

    • SHA1

      2579a5b86c70c30de1f13db2357c5cbab396e941

    • SHA256

      dd3442a269fbd53de977b47103fb9af8332e6b2727becbe66041f27e14d3486f

    • SHA512

      4090aade6b870fa888faf84cbcd1264cd388904bf67442942a92c2efe08f4c9981cdb0fec1d3eae6baa170ccd5d198190dc6e8361c98b5347e9fade1d46b2bfd

    • SSDEEP

      393216:tuY0fY/QmvY8L5gTI60ZiQwslZzbDG69+xDI6Hdx2ka+uhQ:tu1qQmvATyLrlZzWLjHj2xe

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks