General

  • Target

    f4e9d8fb38deab9158240104d1b33ffb_JaffaCakes118

  • Size

    18.0MB

  • Sample

    240925-b92dgs1bnc

  • MD5

    f4e9d8fb38deab9158240104d1b33ffb

  • SHA1

    ee6c00744626b4496e5c6f853cb8cfc74465ca1e

  • SHA256

    9949fbd77c7d9ee63fc28139473ba4c9d026d05f874ef8ca6d2342ad63f3882b

  • SHA512

    ea5fe41e3a663d8e852377cf2b493d5c5c14b81ff414ef79da5b0447d587d093ebc492f12e52cafe8828ce63348b9fa5542d1100690d5f8adc31202dd78c9a91

  • SSDEEP

    393216:muYQvUBLWrcJLrhzof0jXlcJ+r2tF9Ymu1awdaVgfTsh:muvKecJnYYcF9uc6q

Malware Config

Targets

    • Target

      f4e9d8fb38deab9158240104d1b33ffb_JaffaCakes118

    • Size

      18.0MB

    • MD5

      f4e9d8fb38deab9158240104d1b33ffb

    • SHA1

      ee6c00744626b4496e5c6f853cb8cfc74465ca1e

    • SHA256

      9949fbd77c7d9ee63fc28139473ba4c9d026d05f874ef8ca6d2342ad63f3882b

    • SHA512

      ea5fe41e3a663d8e852377cf2b493d5c5c14b81ff414ef79da5b0447d587d093ebc492f12e52cafe8828ce63348b9fa5542d1100690d5f8adc31202dd78c9a91

    • SSDEEP

      393216:muYQvUBLWrcJLrhzof0jXlcJ+r2tF9Ymu1awdaVgfTsh:muvKecJnYYcF9uc6q

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks