General

  • Target

    4bb03ab99296dc42ee35817530463d48_JaffaCakes118

  • Size

    26.4MB

  • Sample

    240516-shf2xaac2s

  • MD5

    4bb03ab99296dc42ee35817530463d48

  • SHA1

    76bec8c35d966695cd28bc70876d2d8df0ab36d5

  • SHA256

    b770372a732b2fbeb98583f7de4f5944fdfe70aa94e5d0e755dd902c2db56b7b

  • SHA512

    67749fa9d958d60f9b9841e69ee5968c73a4d483c587a6b84e8f18ac15a639cb84a14900dc1c1dd884ffc8c56e8334f6b0aec2ab0d5bdded2ea61efe127c379c

  • SSDEEP

    786432:E8UmvzGvODYYUv8NCy7+kSegbBSubebTz8Zwh9Xx:EUG2UYO8NHCkSegbBSEebTAwh9Xx

Malware Config

Targets

    • Target

      4bb03ab99296dc42ee35817530463d48_JaffaCakes118

    • Size

      26.4MB

    • MD5

      4bb03ab99296dc42ee35817530463d48

    • SHA1

      76bec8c35d966695cd28bc70876d2d8df0ab36d5

    • SHA256

      b770372a732b2fbeb98583f7de4f5944fdfe70aa94e5d0e755dd902c2db56b7b

    • SHA512

      67749fa9d958d60f9b9841e69ee5968c73a4d483c587a6b84e8f18ac15a639cb84a14900dc1c1dd884ffc8c56e8334f6b0aec2ab0d5bdded2ea61efe127c379c

    • SSDEEP

      786432:E8UmvzGvODYYUv8NCy7+kSegbBSubebTz8Zwh9Xx:EUG2UYO8NHCkSegbBSEebTAwh9Xx

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks