General

  • Target

    52b859941aeae463735336b3f243ccb2_JaffaCakes118

  • Size

    19.0MB

  • Sample

    241017-vewdjavgrg

  • MD5

    52b859941aeae463735336b3f243ccb2

  • SHA1

    29c0c6fd81f191cf73e539d7fe0c4fccf83a6b0b

  • SHA256

    abf89b6c6e932dd3c580b43aee510008b933b8eb0283d386814345ded146440f

  • SHA512

    d44390c4e8aeac793607bddaa415ab89cf28fdfe8b3d7ac18e89aa01f7c481e602477d6f4ffa9a84f1213be1398c474bbf03bf0c943bcb0d3afe4180aa6f46f9

  • SSDEEP

    393216:1sQ3nJGc8Kvf16RLnzpeFFUS0HqmKnNeQ9O5ql20CParw8IXdxxtHcefjxBzvS:WQ3nJGcXvNULNe8zHWzI5f/Parw8GAWs

Malware Config

Targets

    • Target

      52b859941aeae463735336b3f243ccb2_JaffaCakes118

    • Size

      19.0MB

    • MD5

      52b859941aeae463735336b3f243ccb2

    • SHA1

      29c0c6fd81f191cf73e539d7fe0c4fccf83a6b0b

    • SHA256

      abf89b6c6e932dd3c580b43aee510008b933b8eb0283d386814345ded146440f

    • SHA512

      d44390c4e8aeac793607bddaa415ab89cf28fdfe8b3d7ac18e89aa01f7c481e602477d6f4ffa9a84f1213be1398c474bbf03bf0c943bcb0d3afe4180aa6f46f9

    • SSDEEP

      393216:1sQ3nJGc8Kvf16RLnzpeFFUS0HqmKnNeQ9O5ql20CParw8IXdxxtHcefjxBzvS:WQ3nJGcXvNULNe8zHWzI5f/Parw8GAWs

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks