General

  • Target

    3e275e08886ccc90bf148c4efc39632c_JaffaCakes118

  • Size

    2.0MB

  • Sample

    240513-g99bzsae5v

  • MD5

    3e275e08886ccc90bf148c4efc39632c

  • SHA1

    a789964b9f5b89b65e49b92f3e0ebc99f630ac0d

  • SHA256

    ee9028cb67f2f0c62ad5689b60231ea48b61a7a1425e52079569237863ffba55

  • SHA512

    b9c02a09dbdfce990727bd57f0c1f434d981f9854b7aba18df2beeedf972e30659361deb87988580194f53a4edb28ed36caae57f0f7e5cf89be0aed15dc91ffc

  • SSDEEP

    49152:ZCSbmpoBqr5rR5jgmzjTYm8y59eiliEcVV:4KMr5LRvTf8yqzEcVV

Malware Config

Targets

    • Target

      3e275e08886ccc90bf148c4efc39632c_JaffaCakes118

    • Size

      2.0MB

    • MD5

      3e275e08886ccc90bf148c4efc39632c

    • SHA1

      a789964b9f5b89b65e49b92f3e0ebc99f630ac0d

    • SHA256

      ee9028cb67f2f0c62ad5689b60231ea48b61a7a1425e52079569237863ffba55

    • SHA512

      b9c02a09dbdfce990727bd57f0c1f434d981f9854b7aba18df2beeedf972e30659361deb87988580194f53a4edb28ed36caae57f0f7e5cf89be0aed15dc91ffc

    • SSDEEP

      49152:ZCSbmpoBqr5rR5jgmzjTYm8y59eiliEcVV:4KMr5LRvTf8yqzEcVV

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the phone number (MSISDN for GSM devices)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks