General

  • Target

    0cb62d063ba8058b19bfc84b4a8f6501_JaffaCakes118

  • Size

    1.5MB

  • Sample

    241002-2er5fa1bkq

  • MD5

    0cb62d063ba8058b19bfc84b4a8f6501

  • SHA1

    a39afabfe3468be04d117307276c6446ec72562e

  • SHA256

    d75a56a2ca338495c3c0da0c8cd46134054668fd8291104cd59a0a24c20c0f9a

  • SHA512

    050f6f8b858b9cb1e3415168af186f6b0fdd2238edda86fb7b3e7f8957f639290f546897463d462cb41dc23e2462ea69384f7a75b467a1f72e79df57876257b5

  • SSDEEP

    24576:ucTqD5mZM/c3LBCGZh4zLPWvl6EEoHrX94S7SZorgozEbnW87YGnW9eYY:ucTqD50M4f6zLPAQSX9LFrgm4WW7WMn

Malware Config

Targets

    • Target

      0cb62d063ba8058b19bfc84b4a8f6501_JaffaCakes118

    • Size

      1.5MB

    • MD5

      0cb62d063ba8058b19bfc84b4a8f6501

    • SHA1

      a39afabfe3468be04d117307276c6446ec72562e

    • SHA256

      d75a56a2ca338495c3c0da0c8cd46134054668fd8291104cd59a0a24c20c0f9a

    • SHA512

      050f6f8b858b9cb1e3415168af186f6b0fdd2238edda86fb7b3e7f8957f639290f546897463d462cb41dc23e2462ea69384f7a75b467a1f72e79df57876257b5

    • SSDEEP

      24576:ucTqD5mZM/c3LBCGZh4zLPWvl6EEoHrX94S7SZorgozEbnW87YGnW9eYY:ucTqD50M4f6zLPAQSX9LFrgm4WW7WMn

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads the content of the SMS messages.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks