General

  • Target

    59f5cb5a77ed5314d69b2b7f8b8d9f29_JaffaCakes118

  • Size

    3.3MB

  • Sample

    240519-pa7ywagd66

  • MD5

    59f5cb5a77ed5314d69b2b7f8b8d9f29

  • SHA1

    67700b8a8fdf83ad899b163e2ccedde4dd3f907d

  • SHA256

    da7d19aabf81bcf72b72e8d551f0c3801f26fbc98143708da72312f34144e7c3

  • SHA512

    92587419a0819e06b7d1437aca7613f022fe324c8f958d87251353d1cc177fdab43106f0092d044002834d7f797d8d8726e279b3867ff513e59d63451df4f78b

  • SSDEEP

    98304:fPrL/jD6ZNvBoknQqBDCirqDMaepvb3LHOtywXj3kYK1pGE:fDDSZNKkBQe5Z

Malware Config

Targets

    • Target

      59f5cb5a77ed5314d69b2b7f8b8d9f29_JaffaCakes118

    • Size

      3.3MB

    • MD5

      59f5cb5a77ed5314d69b2b7f8b8d9f29

    • SHA1

      67700b8a8fdf83ad899b163e2ccedde4dd3f907d

    • SHA256

      da7d19aabf81bcf72b72e8d551f0c3801f26fbc98143708da72312f34144e7c3

    • SHA512

      92587419a0819e06b7d1437aca7613f022fe324c8f958d87251353d1cc177fdab43106f0092d044002834d7f797d8d8726e279b3867ff513e59d63451df4f78b

    • SSDEEP

      98304:fPrL/jD6ZNvBoknQqBDCirqDMaepvb3LHOtywXj3kYK1pGE:fDDSZNKkBQe5Z

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks