General

  • Target

    1c8db7b318eb029ceae3b16b3c892713_JaffaCakes118

  • Size

    16.9MB

  • Sample

    240701-1abq8avarl

  • MD5

    1c8db7b318eb029ceae3b16b3c892713

  • SHA1

    4e6328f2d69e59d876a9eb1a5abd2a99a2e3ae3a

  • SHA256

    b55e868e735d9c0fa14a8de269d5da523c5859162f66c6063de0bc86a2a2b5c1

  • SHA512

    efefebd4a1b6d08ed9f53db0a32c78483720d99c487ae45bef630556da1181ad2a2ec6ce95fac39d1340d41bbf54d373b70a43eabfe098405f3133f58434630e

  • SSDEEP

    393216:PbQieqGclK8ofDCGHL2pLCcHyuHG3ZwCGGZ0CucY/5HevQa:PM7q7OL8WcHjGpwcZ0CuclJ

Malware Config

Targets

    • Target

      1c8db7b318eb029ceae3b16b3c892713_JaffaCakes118

    • Size

      16.9MB

    • MD5

      1c8db7b318eb029ceae3b16b3c892713

    • SHA1

      4e6328f2d69e59d876a9eb1a5abd2a99a2e3ae3a

    • SHA256

      b55e868e735d9c0fa14a8de269d5da523c5859162f66c6063de0bc86a2a2b5c1

    • SHA512

      efefebd4a1b6d08ed9f53db0a32c78483720d99c487ae45bef630556da1181ad2a2ec6ce95fac39d1340d41bbf54d373b70a43eabfe098405f3133f58434630e

    • SSDEEP

      393216:PbQieqGclK8ofDCGHL2pLCcHyuHG3ZwCGGZ0CucY/5HevQa:PM7q7OL8WcHjGpwcZ0CuclJ

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks