General

  • Target

    8e2f494c2bf15471527c11ac637c2708_JaffaCakes118

  • Size

    3.2MB

  • Sample

    241104-af2aysxmc1

  • MD5

    8e2f494c2bf15471527c11ac637c2708

  • SHA1

    f3a975dfa6645021902943b28c719e9d2fa6c158

  • SHA256

    59c2ba5b9b47a6c0df0e2a54b83f38d943419b7fdec6d37797fce8961a549458

  • SHA512

    9994b20cd9596d411f330197496f4c5dbee004d4c0506e7664b49ce247d673675563e8ed17ecf13c8e91fee0ef0e31922c2541ce2b0ea471f0b84bb62a6fae51

  • SSDEEP

    98304:ADdOln7OkrzsTPkOtg9WJX8nCdsi6OBavggJEnz45L9wMYc:ABQCkcTPXe8JXtdsIBaLyK5wMP

Malware Config

Targets

    • Target

      8e2f494c2bf15471527c11ac637c2708_JaffaCakes118

    • Size

      3.2MB

    • MD5

      8e2f494c2bf15471527c11ac637c2708

    • SHA1

      f3a975dfa6645021902943b28c719e9d2fa6c158

    • SHA256

      59c2ba5b9b47a6c0df0e2a54b83f38d943419b7fdec6d37797fce8961a549458

    • SHA512

      9994b20cd9596d411f330197496f4c5dbee004d4c0506e7664b49ce247d673675563e8ed17ecf13c8e91fee0ef0e31922c2541ce2b0ea471f0b84bb62a6fae51

    • SSDEEP

      98304:ADdOln7OkrzsTPkOtg9WJX8nCdsi6OBavggJEnz45L9wMYc:ABQCkcTPXe8JXtdsIBaLyK5wMP

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the phone number (MSISDN for GSM devices)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks