General

  • Target

    28c09f5166796632e8cc02344eaafb19_JaffaCakes118

  • Size

    1.8MB

  • Sample

    241009-cbe82avgqg

  • MD5

    28c09f5166796632e8cc02344eaafb19

  • SHA1

    f2ddaa5449547b2849e2d4dff18ff799a363220f

  • SHA256

    8ae8f0e90eda24ddf94424db0a6cc6e6cc1faaef3030cdec5998e95de4b665dc

  • SHA512

    ddb707594f7c5b0d59100a778b0e384babc62d03e54548b0587ad19ffad288f43b33533d861769e1827d4df3213f350916df21e757a7b4421a67757716fdeae7

  • SSDEEP

    49152:vTX7lbPBJmZOz6sy03mytjfMEvkk2jrgMkRgl:vDJbPnT6ormCmj0PR6

Malware Config

Targets

    • Target

      28c09f5166796632e8cc02344eaafb19_JaffaCakes118

    • Size

      1.8MB

    • MD5

      28c09f5166796632e8cc02344eaafb19

    • SHA1

      f2ddaa5449547b2849e2d4dff18ff799a363220f

    • SHA256

      8ae8f0e90eda24ddf94424db0a6cc6e6cc1faaef3030cdec5998e95de4b665dc

    • SHA512

      ddb707594f7c5b0d59100a778b0e384babc62d03e54548b0587ad19ffad288f43b33533d861769e1827d4df3213f350916df21e757a7b4421a67757716fdeae7

    • SSDEEP

      49152:vTX7lbPBJmZOz6sy03mytjfMEvkk2jrgMkRgl:vDJbPnT6ormCmj0PR6

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the phone number (MSISDN for GSM devices)

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Target

      assets.db

    • Size

      77KB

    • MD5

      9837ebea45d368f0da9d2e182b9670e3

    • SHA1

      06892d46042035b0a71415b16996b41eb66f3ffb

    • SHA256

      11468f51feee1ac6b2044d011326e1831a69cf07109e6184d2c853d651b9e609

    • SHA512

      835e4168b5c5c8655973821aa54ab13fdb316800aca2c995e7d8f8a1d571e77e276a09c12b5d94d71e30228bef5561b83b11d54c8afc1cb1eb62d24d2fa72df4

    • SSDEEP

      1536:G+GH4xr9JRg/xh5PmkrMO0jzsg4u3GQhKzdcYBwTKS+YQJsjFuXrZDCPf:G2hTRO7PHrMHzsgPzQLwKvYTj+tGPf

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks