General

  • Target

    4fb2292a39e2e3ad801c692d3c5c604f_JaffaCakes118

  • Size

    3.9MB

  • Sample

    240517-nayvjafa2s

  • MD5

    4fb2292a39e2e3ad801c692d3c5c604f

  • SHA1

    88f229f6911b0a18a3c964cebaadb0a052c98fa4

  • SHA256

    e7f4c11dc378fd7700b9ca5a74429f2846087fc6ce9efe744ded546ae8704f78

  • SHA512

    d1b0d5ac4a9bfd47e1a3c18a66cd73092342e6b2947d40ca9845bfc14f41c827126dd60619f3bb268d6dcabbed1ee83651c75110a2e3313c8655c9152dec5493

  • SSDEEP

    98304:Pl3ee/PBVh5B73cnpMLGYLYPbqP8rFPdKGfd0lOOM5sG//OnX:3rfB73qSIu8r9dKGfd0lOOM5sG//k

Malware Config

Targets

    • Target

      4fb2292a39e2e3ad801c692d3c5c604f_JaffaCakes118

    • Size

      3.9MB

    • MD5

      4fb2292a39e2e3ad801c692d3c5c604f

    • SHA1

      88f229f6911b0a18a3c964cebaadb0a052c98fa4

    • SHA256

      e7f4c11dc378fd7700b9ca5a74429f2846087fc6ce9efe744ded546ae8704f78

    • SHA512

      d1b0d5ac4a9bfd47e1a3c18a66cd73092342e6b2947d40ca9845bfc14f41c827126dd60619f3bb268d6dcabbed1ee83651c75110a2e3313c8655c9152dec5493

    • SSDEEP

      98304:Pl3ee/PBVh5B73cnpMLGYLYPbqP8rFPdKGfd0lOOM5sG//OnX:3rfB73qSIu8r9dKGfd0lOOM5sG//k

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks