General

  • Target

    8adba31dc13952f0395827f3a35ad8f7_JaffaCakes118

  • Size

    23.7MB

  • Sample

    241103-lw4lsstpen

  • MD5

    8adba31dc13952f0395827f3a35ad8f7

  • SHA1

    717d958d4cae7147ae0af0c2fbfce8ff44a270cc

  • SHA256

    6c628b073f893cd458ead4a1ce090645bbc098fbe2f5d9508ce20e81c5a85f2a

  • SHA512

    990dbe73227b3624141adbfcac8825f94a8043e2cb56c62cdc880bc12e34148258c21c68808685454c9b6ffbc844da1024bf0725cb08462765797a0635a47696

  • SSDEEP

    393216:i4BrVgNu6oGIbSgnmSj3+TDzvDF9Z/yLXYOvhg/lNWQQ+VxTyPspQ1kWLIgJaysn:RBrVH6olnmSj3+TPrQHgz60yPQK87t6Y

Malware Config

Targets

    • Target

      8adba31dc13952f0395827f3a35ad8f7_JaffaCakes118

    • Size

      23.7MB

    • MD5

      8adba31dc13952f0395827f3a35ad8f7

    • SHA1

      717d958d4cae7147ae0af0c2fbfce8ff44a270cc

    • SHA256

      6c628b073f893cd458ead4a1ce090645bbc098fbe2f5d9508ce20e81c5a85f2a

    • SHA512

      990dbe73227b3624141adbfcac8825f94a8043e2cb56c62cdc880bc12e34148258c21c68808685454c9b6ffbc844da1024bf0725cb08462765797a0635a47696

    • SSDEEP

      393216:i4BrVgNu6oGIbSgnmSj3+TDzvDF9Z/yLXYOvhg/lNWQQ+VxTyPspQ1kWLIgJaysn:RBrVH6olnmSj3+TPrQHgz60yPQK87t6Y

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

    • Requests cell location

      Uses Android APIs to to get current cell information.

MITRE ATT&CK Mobile v15

Tasks