General

  • Target

    3efd0c91747e3db37b5e35b717b8072d_JaffaCakes118

  • Size

    15.6MB

  • Sample

    240513-maeafsah23

  • MD5

    3efd0c91747e3db37b5e35b717b8072d

  • SHA1

    df637381a29dd709e9b513f8736a3fb1cddca523

  • SHA256

    f95f6fad14c9f3fd813e65c5c7d2767ea5b31bed4c753e1c6e412a35e58fdb6e

  • SHA512

    b1f1b1c28c9719a105f708b3035f8a49102685595dfb02db7205279c9b3aa17c713d37217235a7a5b9f5f6d43b0337a8e50ae235b69594360933a29efc950a70

  • SSDEEP

    393216:fX3TYkLMnhJZE4nKWiO1q2RZNzenYAC0w9yBddJLO+SocAGt:fHTYiMhJZdnIX2R7nAC0w9gJLLc/t

Malware Config

Targets

    • Target

      3efd0c91747e3db37b5e35b717b8072d_JaffaCakes118

    • Size

      15.6MB

    • MD5

      3efd0c91747e3db37b5e35b717b8072d

    • SHA1

      df637381a29dd709e9b513f8736a3fb1cddca523

    • SHA256

      f95f6fad14c9f3fd813e65c5c7d2767ea5b31bed4c753e1c6e412a35e58fdb6e

    • SHA512

      b1f1b1c28c9719a105f708b3035f8a49102685595dfb02db7205279c9b3aa17c713d37217235a7a5b9f5f6d43b0337a8e50ae235b69594360933a29efc950a70

    • SSDEEP

      393216:fX3TYkLMnhJZE4nKWiO1q2RZNzenYAC0w9yBddJLO+SocAGt:fHTYiMhJZdnIX2R7nAC0w9gJLLc/t

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks