General

  • Target

    335d94ecc8baccbe81fabb4b90b31749_JaffaCakes118

  • Size

    8.4MB

  • Sample

    240511-hy758acg4x

  • MD5

    335d94ecc8baccbe81fabb4b90b31749

  • SHA1

    77980f8d248655eda43e4a224b474b71469346e4

  • SHA256

    a58c8d07505c8303f728a97d464d7bc745a1e6ffb48ca8b7f4d70e46ea26d55a

  • SHA512

    e630c1422a5878ab42ba38aa64d73f09a214b5d70d69eb5fc5109fcec2af9665cc6f345b941421e226f640220cfde404cbb90d46175c03d09b6fa6f16c7c3dc8

  • SSDEEP

    196608:g4Yn7fmFMPF3a/8oFc37a795XQ7qKEPtoViyKzZMZN:d2jN3a18ax5kEPCbOZMv

Malware Config

Targets

    • Target

      335d94ecc8baccbe81fabb4b90b31749_JaffaCakes118

    • Size

      8.4MB

    • MD5

      335d94ecc8baccbe81fabb4b90b31749

    • SHA1

      77980f8d248655eda43e4a224b474b71469346e4

    • SHA256

      a58c8d07505c8303f728a97d464d7bc745a1e6ffb48ca8b7f4d70e46ea26d55a

    • SHA512

      e630c1422a5878ab42ba38aa64d73f09a214b5d70d69eb5fc5109fcec2af9665cc6f345b941421e226f640220cfde404cbb90d46175c03d09b6fa6f16c7c3dc8

    • SSDEEP

      196608:g4Yn7fmFMPF3a/8oFc37a795XQ7qKEPtoViyKzZMZN:d2jN3a18ax5kEPCbOZMv

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks