General

  • Target

    58fb8f875f3c9acf0fd0c4ee3c0a002a_JaffaCakes118

  • Size

    562KB

  • Sample

    240519-g6svtsed2z

  • MD5

    58fb8f875f3c9acf0fd0c4ee3c0a002a

  • SHA1

    7afd33c865c9c6074fca3ef720fb04c5bb86a3d2

  • SHA256

    b8b9868a24898c8cb39d90c6d38233efabff5b0daf67bbbb54d1e3d0751dd4cb

  • SHA512

    5406a148eb107934f56c562670c4097a1390547634e7636e978e0ac21a4e5fba2908637aaf954b972e3ab6d8a7b1a3555b3fff2589c0ed4993f247aa83fb9cba

  • SSDEEP

    6144:mXnEmVNxM4ReDzUjfk40/tbpZt2ixtxrEIcpnb1tX/LznGPgnYXfx0A1Yy78T0Pj:mXnEEM4cqi1bAixputzzGPgYXvP4lG

Malware Config

Targets

    • Target

      58fb8f875f3c9acf0fd0c4ee3c0a002a_JaffaCakes118

    • Size

      562KB

    • MD5

      58fb8f875f3c9acf0fd0c4ee3c0a002a

    • SHA1

      7afd33c865c9c6074fca3ef720fb04c5bb86a3d2

    • SHA256

      b8b9868a24898c8cb39d90c6d38233efabff5b0daf67bbbb54d1e3d0751dd4cb

    • SHA512

      5406a148eb107934f56c562670c4097a1390547634e7636e978e0ac21a4e5fba2908637aaf954b972e3ab6d8a7b1a3555b3fff2589c0ed4993f247aa83fb9cba

    • SSDEEP

      6144:mXnEmVNxM4ReDzUjfk40/tbpZt2ixtxrEIcpnb1tX/LznGPgnYXfx0A1Yy78T0Pj:mXnEEM4cqi1bAixputzzGPgYXvP4lG

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the browser bookmarks.

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks