General

  • Target

    705aa748a83b9ccb2142e6293a079c55_JaffaCakes118

  • Size

    2.0MB

  • Sample

    241023-xknxraxcjq

  • MD5

    705aa748a83b9ccb2142e6293a079c55

  • SHA1

    de6fdeb0e1cad3bfefaf39ea9129ba62e7ced66d

  • SHA256

    830b23672a3d858d253fccb49087a52d5e9f21fae654f683eb34d833fab03d99

  • SHA512

    ce2e7578dbf9fb7067fcaffb24f2a511272ad7067b676fc4c4bd4919274c683f760895fd8d5d3bb3ddb45381e4a4abd2a41142cb855e34c633eda806f2b6ddc4

  • SSDEEP

    49152:K5npY7LBrC4T+l9YCF4aJFQCA3TQEENbEJPf4AyGGWa6jAJuekhxe:K5npY7FmG+lGCF4aDQCADbENbEAkbjAn

Malware Config

Targets

    • Target

      705aa748a83b9ccb2142e6293a079c55_JaffaCakes118

    • Size

      2.0MB

    • MD5

      705aa748a83b9ccb2142e6293a079c55

    • SHA1

      de6fdeb0e1cad3bfefaf39ea9129ba62e7ced66d

    • SHA256

      830b23672a3d858d253fccb49087a52d5e9f21fae654f683eb34d833fab03d99

    • SHA512

      ce2e7578dbf9fb7067fcaffb24f2a511272ad7067b676fc4c4bd4919274c683f760895fd8d5d3bb3ddb45381e4a4abd2a41142cb855e34c633eda806f2b6ddc4

    • SSDEEP

      49152:K5npY7LBrC4T+l9YCF4aJFQCA3TQEENbEJPf4AyGGWa6jAJuekhxe:K5npY7FmG+lGCF4aDQCADbENbEAkbjAn

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks