General

  • Target

    54eac4cb267a2ee26165942548fe80c8_JaffaCakes118

  • Size

    21.1MB

  • Sample

    240518-ql4w2add2x

  • MD5

    54eac4cb267a2ee26165942548fe80c8

  • SHA1

    998441e26d506db08ebf9eb8c6270eb2089b9bfe

  • SHA256

    87328403f86f04ddd622c23235e3d95bc18fee012394e58dde120368f6b273b0

  • SHA512

    992c6830f09a28b5905060307d649840ccb79d4bf4181deb630502dc682f77ccbb9468d5f85ef3b5cb7af805c0064136c955d6282e931198b89132c2a6097192

  • SSDEEP

    393216:XskIdIzut4lb2FMFu85DUju+cr4EmBG+HVa/nK/V/tNwRBdRsDBjpSGJ1lUI:+Outm2FS1pUvob+HVa/K/V/tNwjsVFSY

Malware Config

Targets

    • Target

      54eac4cb267a2ee26165942548fe80c8_JaffaCakes118

    • Size

      21.1MB

    • MD5

      54eac4cb267a2ee26165942548fe80c8

    • SHA1

      998441e26d506db08ebf9eb8c6270eb2089b9bfe

    • SHA256

      87328403f86f04ddd622c23235e3d95bc18fee012394e58dde120368f6b273b0

    • SHA512

      992c6830f09a28b5905060307d649840ccb79d4bf4181deb630502dc682f77ccbb9468d5f85ef3b5cb7af805c0064136c955d6282e931198b89132c2a6097192

    • SSDEEP

      393216:XskIdIzut4lb2FMFu85DUju+cr4EmBG+HVa/nK/V/tNwRBdRsDBjpSGJ1lUI:+Outm2FS1pUvob+HVa/K/V/tNwjsVFSY

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks