General

  • Target

    f8c7149da8e39c4e6970b0929184e923_JaffaCakes118

  • Size

    15.8MB

  • Sample

    240418-z76gesgd2z

  • MD5

    f8c7149da8e39c4e6970b0929184e923

  • SHA1

    a3be4aada45073610de689033038b693a8dc6bd5

  • SHA256

    b1762ed0158ac5d41434c9e184435c83aff2dd4290391147165f7669f32a208c

  • SHA512

    06528d7cba1c0881d48aad65908f63d368d00c39cfe56ae2f6b11543c3502fd7979ed07e134514d5fce7a44f1476de9a9159f3176079554211c207ff37e77c51

  • SSDEEP

    393216:JA96780t9wLNBrIPT8HB/frRvmB/OkwLlZuzuH1:6SPtSLPETYBJo/OkazuiV

Malware Config

Targets

    • Target

      f8c7149da8e39c4e6970b0929184e923_JaffaCakes118

    • Size

      15.8MB

    • MD5

      f8c7149da8e39c4e6970b0929184e923

    • SHA1

      a3be4aada45073610de689033038b693a8dc6bd5

    • SHA256

      b1762ed0158ac5d41434c9e184435c83aff2dd4290391147165f7669f32a208c

    • SHA512

      06528d7cba1c0881d48aad65908f63d368d00c39cfe56ae2f6b11543c3502fd7979ed07e134514d5fce7a44f1476de9a9159f3176079554211c207ff37e77c51

    • SSDEEP

      393216:JA96780t9wLNBrIPT8HB/frRvmB/OkwLlZuzuH1:6SPtSLPETYBJo/OkazuiV

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about running processes on the device.

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection.

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Acquires the wake lock

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks