General

  • Target

    3e632259da70e8a712bb13cf5e934dc3_JaffaCakes118

  • Size

    31.7MB

  • Sample

    240513-jea7tafe85

  • MD5

    3e632259da70e8a712bb13cf5e934dc3

  • SHA1

    27a695ba3d2efc5ddcd08712bee17467c447342d

  • SHA256

    189c98cce333cde038095867f032d76260ddf261a3008aa29f4a8f0843c0f3d1

  • SHA512

    7ea0c315a45518091ac41cf864815f219fee1aae13b73eeb8c75e6759f033e5ef87b88e86b79a3538f94ed4c4d63da36b2285159f1354bf46b83cb6c99c3487e

  • SSDEEP

    786432:YrjdQdvZM3lOOBdhCdTQzAeKjOT7dxPzD6MupL/cpytt8UNSV:85iv63lOOXsdTQzAJjId2pIUtNAV

Malware Config

Targets

    • Target

      3e632259da70e8a712bb13cf5e934dc3_JaffaCakes118

    • Size

      31.7MB

    • MD5

      3e632259da70e8a712bb13cf5e934dc3

    • SHA1

      27a695ba3d2efc5ddcd08712bee17467c447342d

    • SHA256

      189c98cce333cde038095867f032d76260ddf261a3008aa29f4a8f0843c0f3d1

    • SHA512

      7ea0c315a45518091ac41cf864815f219fee1aae13b73eeb8c75e6759f033e5ef87b88e86b79a3538f94ed4c4d63da36b2285159f1354bf46b83cb6c99c3487e

    • SSDEEP

      786432:YrjdQdvZM3lOOBdhCdTQzAeKjOT7dxPzD6MupL/cpytt8UNSV:85iv63lOOXsdTQzAJjId2pIUtNAV

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks