General

  • Target

    706e1e3c4b4ba0ba628c002a351865c0_JaffaCakes118

  • Size

    265KB

  • Sample

    241023-xyzleawapa

  • MD5

    706e1e3c4b4ba0ba628c002a351865c0

  • SHA1

    a604f0ab86b3ed3776a7294bf72ce460576bce95

  • SHA256

    56fb9bdcd41cd1c3d4156212b71c1e8edc183ae617b6f38126e7186f2a6c1804

  • SHA512

    08613d75ee51e0199d12d8b36ad3934cbd07a0866a0c29355ef8f6c4859b84d0abbf02ff6ad1534e68ba3ca5f2a4db80171711083ae4cd703564cd17d5db9c8c

  • SSDEEP

    6144:V7SZ3wCE0qt4GPPyZn1Iu3ZnD6k3Moxf1wgRaCz6uZ20Fw8m5:VG6CZGyRgcfpae6apm3

Malware Config

Targets

    • Target

      706e1e3c4b4ba0ba628c002a351865c0_JaffaCakes118

    • Size

      265KB

    • MD5

      706e1e3c4b4ba0ba628c002a351865c0

    • SHA1

      a604f0ab86b3ed3776a7294bf72ce460576bce95

    • SHA256

      56fb9bdcd41cd1c3d4156212b71c1e8edc183ae617b6f38126e7186f2a6c1804

    • SHA512

      08613d75ee51e0199d12d8b36ad3934cbd07a0866a0c29355ef8f6c4859b84d0abbf02ff6ad1534e68ba3ca5f2a4db80171711083ae4cd703564cd17d5db9c8c

    • SSDEEP

      6144:V7SZ3wCE0qt4GPPyZn1Iu3ZnD6k3Moxf1wgRaCz6uZ20Fw8m5:VG6CZGyRgcfpae6apm3

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Queries information about active data network

    • Requests dangerous framework permissions

MITRE ATT&CK Mobile v15

Tasks