General

  • Target

    f9810ad84eb635973c097bdc5e04f6e4_JaffaCakes118

  • Size

    20.6MB

  • Sample

    240927-ce2lfazblm

  • MD5

    f9810ad84eb635973c097bdc5e04f6e4

  • SHA1

    7b04dd038926b3dcc2e329008ddd9839a2a2665e

  • SHA256

    95e9654e1195db1a83c0400369dd201c4fe4411beed2a8cd35b46c6f34751fa6

  • SHA512

    faca823a0d285b5b234f582dbede35db950d54ed87c95aed33b2109682c91e00a8b9a490f9d78ae3fa4c6a20ac1fab206f6f51c9c464554f0035aa71a84f058a

  • SSDEEP

    393216:KWprHwhmLxLW/6Qd90MsvCuSB9Zag0H3tTyQCx4FJs6KSmGwDTI20X:KWRwUFJdauqmZjHFJGSa020X

Malware Config

Targets

    • Target

      f9810ad84eb635973c097bdc5e04f6e4_JaffaCakes118

    • Size

      20.6MB

    • MD5

      f9810ad84eb635973c097bdc5e04f6e4

    • SHA1

      7b04dd038926b3dcc2e329008ddd9839a2a2665e

    • SHA256

      95e9654e1195db1a83c0400369dd201c4fe4411beed2a8cd35b46c6f34751fa6

    • SHA512

      faca823a0d285b5b234f582dbede35db950d54ed87c95aed33b2109682c91e00a8b9a490f9d78ae3fa4c6a20ac1fab206f6f51c9c464554f0035aa71a84f058a

    • SSDEEP

      393216:KWprHwhmLxLW/6Qd90MsvCuSB9Zag0H3tTyQCx4FJs6KSmGwDTI20X:KWRwUFJdauqmZjHFJGSa020X

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks