General

  • Target

    388df60997b4c86c527e10dee8208743_JaffaCakes118

  • Size

    25.5MB

  • Sample

    240512-ggdplsbd3x

  • MD5

    388df60997b4c86c527e10dee8208743

  • SHA1

    26953421a0f05e75431accb642a340061cf8a48a

  • SHA256

    e0db04dc716efb12340ef314779f94291c7b9b186450210deb6ae8786ca6eb4f

  • SHA512

    4b91c2c00d1a365cffff13d3e86da3573fc2b8eabcefc7b3f7dacc61d1a47376a557dafd8c397a6ff1507637a1be8f14935a29b853a448b399cc39d964a20301

  • SSDEEP

    786432:iixfoeoq8G33ECraq2RnnvgvmK9u0VYQ1fmYwj1NwVIStofCLBS1HYa:3x+qzRonnvg+30VYQ0/1jfF

Malware Config

Targets

    • Target

      388df60997b4c86c527e10dee8208743_JaffaCakes118

    • Size

      25.5MB

    • MD5

      388df60997b4c86c527e10dee8208743

    • SHA1

      26953421a0f05e75431accb642a340061cf8a48a

    • SHA256

      e0db04dc716efb12340ef314779f94291c7b9b186450210deb6ae8786ca6eb4f

    • SHA512

      4b91c2c00d1a365cffff13d3e86da3573fc2b8eabcefc7b3f7dacc61d1a47376a557dafd8c397a6ff1507637a1be8f14935a29b853a448b399cc39d964a20301

    • SSDEEP

      786432:iixfoeoq8G33ECraq2RnnvgvmK9u0VYQ1fmYwj1NwVIStofCLBS1HYa:3x+qzRonnvg+30VYQ0/1jfF

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Reads the content of photos stored on the user's device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks