General

  • Target

    f87e055f6eeb8d14bb63ffb4e0ce01ec_JaffaCakes118

  • Size

    3.1MB

  • Sample

    240418-wnm9ysah66

  • MD5

    f87e055f6eeb8d14bb63ffb4e0ce01ec

  • SHA1

    b6bb7f9276c07f519a9ac1481c8b3f07adcd92ea

  • SHA256

    ab9c193ca732d315d08a1063bf553bfcc9e8e348ed39578cafa0c4698434de02

  • SHA512

    a2ef0e491ee4a30dcd0392ef229ec171f3f318ebde1bd94bf364b31f5a0e6d3514a18733bf8c6a3c41b98777bab3e80e80e6ea91a44b3d398529866302cd73a6

  • SSDEEP

    98304:U3DAWOcunZ0QqQzN9HBFDQGS+/f68gl3Sn:U3sfnZn9h5p6ZA

Malware Config

Targets

    • Target

      f87e055f6eeb8d14bb63ffb4e0ce01ec_JaffaCakes118

    • Size

      3.1MB

    • MD5

      f87e055f6eeb8d14bb63ffb4e0ce01ec

    • SHA1

      b6bb7f9276c07f519a9ac1481c8b3f07adcd92ea

    • SHA256

      ab9c193ca732d315d08a1063bf553bfcc9e8e348ed39578cafa0c4698434de02

    • SHA512

      a2ef0e491ee4a30dcd0392ef229ec171f3f318ebde1bd94bf364b31f5a0e6d3514a18733bf8c6a3c41b98777bab3e80e80e6ea91a44b3d398529866302cd73a6

    • SSDEEP

      98304:U3DAWOcunZ0QqQzN9HBFDQGS+/f68gl3Sn:U3sfnZn9h5p6ZA

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about the current Wi-Fi connection.

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Matrix

Tasks