General

  • Target

    2ef8bf40cb257eeb9f06beeacdfd89b6_JaffaCakes118

  • Size

    3.3MB

  • Sample

    240510-n1b4fscf9w

  • MD5

    2ef8bf40cb257eeb9f06beeacdfd89b6

  • SHA1

    fcc2f8e5632d510893118bc5cd13fd824c5603b4

  • SHA256

    f216d8267b228f95768d907f33aa234821f23875188fd6c9ff9cb1c8980584b3

  • SHA512

    23ea238e2527e762832f76b72fbbfc5ecb1b32f05f1cb13b424752b60c2129ba3f06a0c3e2d3c8922f913a0a24a6106ab19ca51d9e24080457cb613dbe928413

  • SSDEEP

    98304:xugfuWWFkFL7EBasOqFRl8Fr24J73DwpwOtywXN3XWiBj3y:xvLWOLpEcJpXr

Malware Config

Targets

    • Target

      2ef8bf40cb257eeb9f06beeacdfd89b6_JaffaCakes118

    • Size

      3.3MB

    • MD5

      2ef8bf40cb257eeb9f06beeacdfd89b6

    • SHA1

      fcc2f8e5632d510893118bc5cd13fd824c5603b4

    • SHA256

      f216d8267b228f95768d907f33aa234821f23875188fd6c9ff9cb1c8980584b3

    • SHA512

      23ea238e2527e762832f76b72fbbfc5ecb1b32f05f1cb13b424752b60c2129ba3f06a0c3e2d3c8922f913a0a24a6106ab19ca51d9e24080457cb613dbe928413

    • SSDEEP

      98304:xugfuWWFkFL7EBasOqFRl8Fr24J73DwpwOtywXN3XWiBj3y:xvLWOLpEcJpXr

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks