General

  • Target

    3265e12ce81fca5a92b82e7d7e7ed742_JaffaCakes118

  • Size

    14.3MB

  • Sample

    240511-dl1hdscf22

  • MD5

    3265e12ce81fca5a92b82e7d7e7ed742

  • SHA1

    1ecb30c7dcae1a447cea5d9873f50b38ea62e91f

  • SHA256

    6d3701ac3c90700badc28718b50b4d358bf71e4cec3e916d3c730a142e36a11e

  • SHA512

    359d67836ae8242246564395884de927c6bb79b1fdedf6e77648b62ac1ea9eaa7c12e7e9c3ac8038bb9c174f847f1d27a888217ad7e01170344e82c8332e7e54

  • SSDEEP

    393216:VjU1UnRItbFONEUjDHaXea/UmHHaXykRvB3lVfL:VyAREbMNEAD+ea/Uo+NRBfL

Malware Config

Targets

    • Target

      3265e12ce81fca5a92b82e7d7e7ed742_JaffaCakes118

    • Size

      14.3MB

    • MD5

      3265e12ce81fca5a92b82e7d7e7ed742

    • SHA1

      1ecb30c7dcae1a447cea5d9873f50b38ea62e91f

    • SHA256

      6d3701ac3c90700badc28718b50b4d358bf71e4cec3e916d3c730a142e36a11e

    • SHA512

      359d67836ae8242246564395884de927c6bb79b1fdedf6e77648b62ac1ea9eaa7c12e7e9c3ac8038bb9c174f847f1d27a888217ad7e01170344e82c8332e7e54

    • SSDEEP

      393216:VjU1UnRItbFONEUjDHaXea/UmHHaXykRvB3lVfL:VyAREbMNEAD+ea/Uo+NRBfL

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks