General

  • Target

    3bed3f1816f5b8720fe7fbee59280907_JaffaCakes118

  • Size

    319KB

  • Sample

    240512-y782waeg4w

  • MD5

    3bed3f1816f5b8720fe7fbee59280907

  • SHA1

    12da7ef248427403b3e1fc7d132174aa216f7856

  • SHA256

    ef7a261dfeb0a93b365d67e74360309d086aee5b7c61691f5b67ea5aef6a959f

  • SHA512

    d203d66d09976dea9b416f6fe4a769400a25db151f871a9b089d07d407230afcc0067dd98fd1b74748705f11be1d1804843677b2f7037f14adb6f61ebdbb8e7c

  • SSDEEP

    6144:+TkSCrfhVvPbTXYIxdBLTWDTtYew9Wg6nBaWgTnBsltIhdL:+TkSkbvTd0me9TEWHl0dL

Malware Config

Targets

    • Target

      3bed3f1816f5b8720fe7fbee59280907_JaffaCakes118

    • Size

      319KB

    • MD5

      3bed3f1816f5b8720fe7fbee59280907

    • SHA1

      12da7ef248427403b3e1fc7d132174aa216f7856

    • SHA256

      ef7a261dfeb0a93b365d67e74360309d086aee5b7c61691f5b67ea5aef6a959f

    • SHA512

      d203d66d09976dea9b416f6fe4a769400a25db151f871a9b089d07d407230afcc0067dd98fd1b74748705f11be1d1804843677b2f7037f14adb6f61ebdbb8e7c

    • SSDEEP

      6144:+TkSCrfhVvPbTXYIxdBLTWDTtYew9Wg6nBaWgTnBsltIhdL:+TkSkbvTd0me9TEWHl0dL

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks