General

  • Target

    8e207210ecbbeecf5b561aba68e04356_JaffaCakes118

  • Size

    11.8MB

  • Sample

    241103-3xpbyaxkby

  • MD5

    8e207210ecbbeecf5b561aba68e04356

  • SHA1

    2e42738cd0ce052b3a705fc1cda10826c722e0fb

  • SHA256

    c74afa031cb2b7d3ee58255fd622fe3b5772491438e0b1c84ed01207470e20b9

  • SHA512

    52b87d8942387b3180a9370f1955edd05409a73f6ee2841c094d851ee2fae6a74794186033165f03796f93ec0238ee5d42884566565a5b12009b6161459578b7

  • SSDEEP

    196608:e7yKjNJ3Eawtc7NXS012JzaaF+yk1e4lf0ZtuSYBMwoha1FrAYYu9zM:eVNJUawyE01GV+ypw03eUhIhECM

Malware Config

Targets

    • Target

      8e207210ecbbeecf5b561aba68e04356_JaffaCakes118

    • Size

      11.8MB

    • MD5

      8e207210ecbbeecf5b561aba68e04356

    • SHA1

      2e42738cd0ce052b3a705fc1cda10826c722e0fb

    • SHA256

      c74afa031cb2b7d3ee58255fd622fe3b5772491438e0b1c84ed01207470e20b9

    • SHA512

      52b87d8942387b3180a9370f1955edd05409a73f6ee2841c094d851ee2fae6a74794186033165f03796f93ec0238ee5d42884566565a5b12009b6161459578b7

    • SSDEEP

      196608:e7yKjNJ3Eawtc7NXS012JzaaF+yk1e4lf0ZtuSYBMwoha1FrAYYu9zM:eVNJUawyE01GV+ypw03eUhIhECM

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks