General

  • Target

    54e15f61c0fea43dc5e927d48df9b2ae_JaffaCakes118

  • Size

    12.1MB

  • Sample

    240518-qfxkrsda7x

  • MD5

    54e15f61c0fea43dc5e927d48df9b2ae

  • SHA1

    832622eb91b80e59feea83b379b025a06ca42e4f

  • SHA256

    8dbaf348a900e1a4ad4729b877358c5774662337ebcc022464adb167a6a3e701

  • SHA512

    979f858d1cc37665457cd1dadf295d0f0a12093639f61b06ee764b55ab1410d4bb6a1b2d37fb1984a3d6e105a13b4f3cde03b68a51c72092624546ef831aba09

  • SSDEEP

    196608:+TibtBxgHmULRb+GWZ67DmuLukxWQ8WLkxS4Tj+laiZwG8cfJ94kuSl+7nlm1Sz:+TibtBxab+GWZ6FUBnS4HCfJDuSj1Sz

Malware Config

Targets

    • Target

      54e15f61c0fea43dc5e927d48df9b2ae_JaffaCakes118

    • Size

      12.1MB

    • MD5

      54e15f61c0fea43dc5e927d48df9b2ae

    • SHA1

      832622eb91b80e59feea83b379b025a06ca42e4f

    • SHA256

      8dbaf348a900e1a4ad4729b877358c5774662337ebcc022464adb167a6a3e701

    • SHA512

      979f858d1cc37665457cd1dadf295d0f0a12093639f61b06ee764b55ab1410d4bb6a1b2d37fb1984a3d6e105a13b4f3cde03b68a51c72092624546ef831aba09

    • SSDEEP

      196608:+TibtBxgHmULRb+GWZ67DmuLukxWQ8WLkxS4Tj+laiZwG8cfJ94kuSl+7nlm1Sz:+TibtBxab+GWZ6FUBnS4HCfJDuSj1Sz

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks