General

  • Target

    5698c51d38fba70471c1d2f1e1748ed5_JaffaCakes118

  • Size

    9.7MB

  • Sample

    240518-y3a92sea69

  • MD5

    5698c51d38fba70471c1d2f1e1748ed5

  • SHA1

    171c51146bcb841b1e8f9e54e75db5c953a2dd74

  • SHA256

    aebde52db7129cb9f6897d9b07c53ca624fd7a37616a149dbf1fd3b632ce7cbf

  • SHA512

    cc0472e32785790848e7a1c50bd5ed443a64971134f5090baac0cc063d3b9028dd2392acf4e3da23beb4f92b094d4840e2bb156c92b7101fb0baa0992855c164

  • SSDEEP

    196608:TPJ7dAl1WEsWVP1/LPO+pOMkFnb6587XHnWASH7zYi9IVrugo1KHO:TB7d5qP1/GzfonWWb

Malware Config

Targets

    • Target

      5698c51d38fba70471c1d2f1e1748ed5_JaffaCakes118

    • Size

      9.7MB

    • MD5

      5698c51d38fba70471c1d2f1e1748ed5

    • SHA1

      171c51146bcb841b1e8f9e54e75db5c953a2dd74

    • SHA256

      aebde52db7129cb9f6897d9b07c53ca624fd7a37616a149dbf1fd3b632ce7cbf

    • SHA512

      cc0472e32785790848e7a1c50bd5ed443a64971134f5090baac0cc063d3b9028dd2392acf4e3da23beb4f92b094d4840e2bb156c92b7101fb0baa0992855c164

    • SSDEEP

      196608:TPJ7dAl1WEsWVP1/LPO+pOMkFnb6587XHnWASH7zYi9IVrugo1KHO:TB7d5qP1/GzfonWWb

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks