General

  • Target

    1a8f4f92669bf82261d1f26bfc3f98e6_JaffaCakes118

  • Size

    9.6MB

  • Sample

    240701-j5c44athmq

  • MD5

    1a8f4f92669bf82261d1f26bfc3f98e6

  • SHA1

    692603c4f408c88c4879f764d1f0b10bcb21676c

  • SHA256

    c4d5223c1adeadefcd837a66f7e636395c09583fd432a0b3cb4e18a10f736844

  • SHA512

    7085cc460d8abc8b0750ef53a83c48f655b2cc6139c27580133e9ffc0563fe6cfa46e89cd5beef373be1639ada2ed43be935cfcaa0881eb48df6825b3fff46b8

  • SSDEEP

    196608:bu90jg518bm/sU4J9YZxfo6BWnac8+2H5GMtsZeSSCW2Reu82i8f7Nf:bl851ImkU4X2xflIacM5weh2RA2iSpf

Malware Config

Targets

    • Target

      1a8f4f92669bf82261d1f26bfc3f98e6_JaffaCakes118

    • Size

      9.6MB

    • MD5

      1a8f4f92669bf82261d1f26bfc3f98e6

    • SHA1

      692603c4f408c88c4879f764d1f0b10bcb21676c

    • SHA256

      c4d5223c1adeadefcd837a66f7e636395c09583fd432a0b3cb4e18a10f736844

    • SHA512

      7085cc460d8abc8b0750ef53a83c48f655b2cc6139c27580133e9ffc0563fe6cfa46e89cd5beef373be1639ada2ed43be935cfcaa0881eb48df6825b3fff46b8

    • SSDEEP

      196608:bu90jg518bm/sU4J9YZxfo6BWnac8+2H5GMtsZeSSCW2Reu82i8f7Nf:bl851ImkU4X2xflIacM5weh2RA2iSpf

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks