General

  • Target

    533808a52a50a756872fb4729783fee0_JaffaCakes118

  • Size

    3.3MB

  • Sample

    240518-gda5baeb4x

  • MD5

    533808a52a50a756872fb4729783fee0

  • SHA1

    3423f37ac1ecf7fca25fa7c605be6b1d81bfcdab

  • SHA256

    7b8cf4e86acf4218634c83a0bf1e0bf9a99f8eb766e21663e68c17ea39cc36e7

  • SHA512

    8a169b9ffcb32cf82fea5e7d2599eaf80015214a4f6f157d63cd76f3d8c727b2582a1859e1dd2b556e05dc85740d32466a34ce782c4bd7a4d04a13825b48397c

  • SSDEEP

    98304:SsT2L2LQChWe2XPTnszLBzE1TpYpf9zygnHTfup8OtywXL3yyczIHl:SsTo2LQChz4szLBzEBpYpFzfr0

Malware Config

Targets

    • Target

      533808a52a50a756872fb4729783fee0_JaffaCakes118

    • Size

      3.3MB

    • MD5

      533808a52a50a756872fb4729783fee0

    • SHA1

      3423f37ac1ecf7fca25fa7c605be6b1d81bfcdab

    • SHA256

      7b8cf4e86acf4218634c83a0bf1e0bf9a99f8eb766e21663e68c17ea39cc36e7

    • SHA512

      8a169b9ffcb32cf82fea5e7d2599eaf80015214a4f6f157d63cd76f3d8c727b2582a1859e1dd2b556e05dc85740d32466a34ce782c4bd7a4d04a13825b48397c

    • SSDEEP

      98304:SsT2L2LQChWe2XPTnszLBzE1TpYpf9zygnHTfup8OtywXL3yyczIHl:SsTo2LQChz4szLBzEBpYpFzfr0

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks