General

  • Target

    f7dd866d285354c66c1e2226a551da03_JaffaCakes118

  • Size

    17.3MB

  • Sample

    240418-m6jj2scd8s

  • MD5

    f7dd866d285354c66c1e2226a551da03

  • SHA1

    f4469e6d9264f11cf7fad6f1ccb28733cb0994c5

  • SHA256

    2ec6ed3358ba4f9cd3b2e61222872a863141aa7e42a61898b4b73aa9d73f53b9

  • SHA512

    6f41a6457cf05584e55e18e6299ab0ae16ecb5d2d206055618e98d40771c10de2a42ba35fab4f11cd98bcf90cf437b09a72464eca31f719852ef5480d19c94dd

  • SSDEEP

    393216:e1dT65LlgOxKVFL3uArenzoWlM420L7xaupQ2cY+ZvsttyI0Mgj3T:0tahgCKVNkUW6cLN9kZ0t+hj3T

Malware Config

Targets

    • Target

      f7dd866d285354c66c1e2226a551da03_JaffaCakes118

    • Size

      17.3MB

    • MD5

      f7dd866d285354c66c1e2226a551da03

    • SHA1

      f4469e6d9264f11cf7fad6f1ccb28733cb0994c5

    • SHA256

      2ec6ed3358ba4f9cd3b2e61222872a863141aa7e42a61898b4b73aa9d73f53b9

    • SHA512

      6f41a6457cf05584e55e18e6299ab0ae16ecb5d2d206055618e98d40771c10de2a42ba35fab4f11cd98bcf90cf437b09a72464eca31f719852ef5480d19c94dd

    • SSDEEP

      393216:e1dT65LlgOxKVFL3uArenzoWlM420L7xaupQ2cY+ZvsttyI0Mgj3T:0tahgCKVNkUW6cLN9kZ0t+hj3T

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about running processes on the device.

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection.

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Acquires the wake lock

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks