General

  • Target

    5313efbb7be272813b31f7c1ef1c598f_JaffaCakes118

  • Size

    26.8MB

  • Sample

    240518-fcntcacd56

  • MD5

    5313efbb7be272813b31f7c1ef1c598f

  • SHA1

    dfa6f9e49c6cb9b0ccb4a5241c6cd9d6cf9d225d

  • SHA256

    46154eebdc73bc981ebcb2e855c529beee20bd83b53e4cfd95fc6fdee66505d0

  • SHA512

    ec3b7ac9f2bfc4424f3f5a2fb8cb25253532bc2cda2843a6a07ba3a9924dbaaad8c33b57354ad731574b23eb504301b1411d86d29d54286ba24f25a73d2e7edf

  • SSDEEP

    786432:vp5J1sETj8VTGDlenNw02IyayVnD5vsp3+65F99:v9W2enq0gDpuP5z9

Malware Config

Targets

    • Target

      5313efbb7be272813b31f7c1ef1c598f_JaffaCakes118

    • Size

      26.8MB

    • MD5

      5313efbb7be272813b31f7c1ef1c598f

    • SHA1

      dfa6f9e49c6cb9b0ccb4a5241c6cd9d6cf9d225d

    • SHA256

      46154eebdc73bc981ebcb2e855c529beee20bd83b53e4cfd95fc6fdee66505d0

    • SHA512

      ec3b7ac9f2bfc4424f3f5a2fb8cb25253532bc2cda2843a6a07ba3a9924dbaaad8c33b57354ad731574b23eb504301b1411d86d29d54286ba24f25a73d2e7edf

    • SSDEEP

      786432:vp5J1sETj8VTGDlenNw02IyayVnD5vsp3+65F99:v9W2enq0gDpuP5z9

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

    • Target

      MiGameCenterSDKService.apk

    • Size

      2.7MB

    • MD5

      74bb57fcfc9e1dfa622f4e7abd61ca75

    • SHA1

      1fb38efbae667fa037bce0f22fad3df428fdaf3d

    • SHA256

      4b30a4978868d52750366fd2fb67e028efb4d13840fbf4db2b722e533d53751c

    • SHA512

      a4a1e5bca5d7479eef4c1a31f4710a610f63b33f00c1d9887211e6740ef0cff7e986c92325ac8baafa5fddc7dcae73feffa60ff638a742755287db8ea2b9ab61

    • SSDEEP

      49152:/vUE2yuCdkiYOvrCImCZ33sIEpTHlD5ynDiVToq2SUFrNiAZZT7r5/5kwLkzLdHJ:kEJEy3ByD5GDiVTUfPPT7rp5vozLNoC

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

MITRE ATT&CK Mobile v15

Tasks