General

  • Target

    2903ec8ce9f59a07de476a056debf51d_JaffaCakes118

  • Size

    3.9MB

  • Sample

    240509-jsx9hagc9z

  • MD5

    2903ec8ce9f59a07de476a056debf51d

  • SHA1

    c444c46e10eab94d72abb4a2cd6a765a9b20dc9e

  • SHA256

    45dfaec5bfaff58d8c863826e568b1588178ae8ec14cb6806707cf63bb432c1d

  • SHA512

    4641ae999692efc08548c6e949f38a484621bb190cde353fac99b0636a921814b9c42ac1e43ce4c2933b67921097407e10dc879e92698b1d43470878225de6cd

  • SSDEEP

    98304:hUy6KgXJ14og4K6gbN3KOYp3PRCBA9oDDmpqe30Y7pNt5gKXX:hUyn2J14oSYNGBUH3Zt5t

Malware Config

Targets

    • Target

      2903ec8ce9f59a07de476a056debf51d_JaffaCakes118

    • Size

      3.9MB

    • MD5

      2903ec8ce9f59a07de476a056debf51d

    • SHA1

      c444c46e10eab94d72abb4a2cd6a765a9b20dc9e

    • SHA256

      45dfaec5bfaff58d8c863826e568b1588178ae8ec14cb6806707cf63bb432c1d

    • SHA512

      4641ae999692efc08548c6e949f38a484621bb190cde353fac99b0636a921814b9c42ac1e43ce4c2933b67921097407e10dc879e92698b1d43470878225de6cd

    • SSDEEP

      98304:hUy6KgXJ14og4K6gbN3KOYp3PRCBA9oDDmpqe30Y7pNt5gKXX:hUyn2J14oSYNGBUH3Zt5t

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks