General

  • Target

    f9f562c2619428fbf279d96c11ba4a7b_JaffaCakes118

  • Size

    15.8MB

  • Sample

    240927-hyrs8s1bqj

  • MD5

    f9f562c2619428fbf279d96c11ba4a7b

  • SHA1

    66c0d4d00320e9a793200ed0f2dc1e37900a97e7

  • SHA256

    bbfddc241bbfe0bef8d0e849c9ff085a16aa89089605474ce5c2802e026e4f18

  • SHA512

    4f2612ddab5f0cf1bba9e221ae2d73af30f20063496d5a441e18a40e819cf0cc61dda14675b7a9d5ec4589cde99e0dfa2ae657ad1dee5519675ec9bf82a3072f

  • SSDEEP

    393216:KuFHXepW8fO78V3RVqXsC2eNQ+iG/0S15VXxmSo+:KulOpWyOwPVDCpNT5qSo+

Malware Config

Targets

    • Target

      f9f562c2619428fbf279d96c11ba4a7b_JaffaCakes118

    • Size

      15.8MB

    • MD5

      f9f562c2619428fbf279d96c11ba4a7b

    • SHA1

      66c0d4d00320e9a793200ed0f2dc1e37900a97e7

    • SHA256

      bbfddc241bbfe0bef8d0e849c9ff085a16aa89089605474ce5c2802e026e4f18

    • SHA512

      4f2612ddab5f0cf1bba9e221ae2d73af30f20063496d5a441e18a40e819cf0cc61dda14675b7a9d5ec4589cde99e0dfa2ae657ad1dee5519675ec9bf82a3072f

    • SSDEEP

      393216:KuFHXepW8fO78V3RVqXsC2eNQ+iG/0S15VXxmSo+:KulOpWyOwPVDCpNT5qSo+

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks