General

  • Target

    3046a2107eb377e13514f90472ff1fba_JaffaCakes118

  • Size

    12.3MB

  • Sample

    240510-wapwmahd8s

  • MD5

    3046a2107eb377e13514f90472ff1fba

  • SHA1

    47465be7678c9e09c20b88f7382f42e11a45e70d

  • SHA256

    86e4e9f43d0640e2c4c831f0f7c97496f4a69dd3acf8e9e09db2b6191c94bf0f

  • SHA512

    6a6920b58d3bf9d122901cfdf7ff58f046ab2d3f88bc2ac820dc211948e4cbf6b66532892b4cf5e63e1b74edf98d18bb57abc2254067ef980060b0927936d2a7

  • SSDEEP

    196608:vvD26pDmV6zUKX2q5pqN+lqN2SHTF6+MwedO/C4Mf4coMBpkhgaN+6L/706ddllg:vvHsq50WqHHZ9C4QBpMdT0slTKUTNuOa

Malware Config

Targets

    • Target

      3046a2107eb377e13514f90472ff1fba_JaffaCakes118

    • Size

      12.3MB

    • MD5

      3046a2107eb377e13514f90472ff1fba

    • SHA1

      47465be7678c9e09c20b88f7382f42e11a45e70d

    • SHA256

      86e4e9f43d0640e2c4c831f0f7c97496f4a69dd3acf8e9e09db2b6191c94bf0f

    • SHA512

      6a6920b58d3bf9d122901cfdf7ff58f046ab2d3f88bc2ac820dc211948e4cbf6b66532892b4cf5e63e1b74edf98d18bb57abc2254067ef980060b0927936d2a7

    • SSDEEP

      196608:vvD26pDmV6zUKX2q5pqN+lqN2SHTF6+MwedO/C4Mf4coMBpkhgaN+6L/706ddllg:vvHsq50WqHHZ9C4QBpMdT0slTKUTNuOa

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks