General

  • Target

    335d924ebf6e7df5a0824bf0f9911020_JaffaCakes118

  • Size

    3.4MB

  • Sample

    240511-hy4ssscg4t

  • MD5

    335d924ebf6e7df5a0824bf0f9911020

  • SHA1

    b0eb7903d8c5e274290f0bad142ec64210b517c5

  • SHA256

    4ce72d3eedecb47fb488b55d34ac81c0a8aad73bbd5da7ba48a359e4af3917ca

  • SHA512

    65c9cdd4289f0b612786ec7d6e79e52b21cf5a1fef8a22ec0ba3e0d5ae1d77fee91242a1bbeb84775acbaf2d25226b884fa9e8a963a5dd5585ac0d5a2675a866

  • SSDEEP

    98304:VdLJTtjzDOeR+D739LlqhvARx78k8XuEbeoi:V5jzronJlqhKD8Xu5oi

Malware Config

Targets

    • Target

      335d924ebf6e7df5a0824bf0f9911020_JaffaCakes118

    • Size

      3.4MB

    • MD5

      335d924ebf6e7df5a0824bf0f9911020

    • SHA1

      b0eb7903d8c5e274290f0bad142ec64210b517c5

    • SHA256

      4ce72d3eedecb47fb488b55d34ac81c0a8aad73bbd5da7ba48a359e4af3917ca

    • SHA512

      65c9cdd4289f0b612786ec7d6e79e52b21cf5a1fef8a22ec0ba3e0d5ae1d77fee91242a1bbeb84775acbaf2d25226b884fa9e8a963a5dd5585ac0d5a2675a866

    • SSDEEP

      98304:VdLJTtjzDOeR+D739LlqhvARx78k8XuEbeoi:V5jzronJlqhKD8Xu5oi

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks