General

  • Target

    50d4948797c7f5d1f8e26cbd0b9d6614_JaffaCakes118

  • Size

    30.3MB

  • Sample

    240517-wxgtjacc4v

  • MD5

    50d4948797c7f5d1f8e26cbd0b9d6614

  • SHA1

    e62f5991d41674694496b741d79051b1b2a0f549

  • SHA256

    62ac3761a65381959543ce4a4abcb1657dca63aadf0852f85f773566a11eadd0

  • SHA512

    f1c3d70568498b6bdf5515342e5d962a48086486312f6e1d1fa4a3bcab5679ce0b47ee2431bca8f019be07f41603d75859f49c3b1cc7c2b55b0ab90a1a47436f

  • SSDEEP

    786432:6eV+WXvXOukEvIdh3ebG/7MbenRd61Eu2G7OKz53ly6pOany:6ewQXMEQL3ebG/7kEu2eh3Ny

Malware Config

Targets

    • Target

      50d4948797c7f5d1f8e26cbd0b9d6614_JaffaCakes118

    • Size

      30.3MB

    • MD5

      50d4948797c7f5d1f8e26cbd0b9d6614

    • SHA1

      e62f5991d41674694496b741d79051b1b2a0f549

    • SHA256

      62ac3761a65381959543ce4a4abcb1657dca63aadf0852f85f773566a11eadd0

    • SHA512

      f1c3d70568498b6bdf5515342e5d962a48086486312f6e1d1fa4a3bcab5679ce0b47ee2431bca8f019be07f41603d75859f49c3b1cc7c2b55b0ab90a1a47436f

    • SSDEEP

      786432:6eV+WXvXOukEvIdh3ebG/7MbenRd61Eu2G7OKz53ly6pOany:6ewQXMEQL3ebG/7kEu2eh3Ny

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks