General

  • Target

    5ebc11cbd1cc4b421d41e2556ef1ad29_JaffaCakes118

  • Size

    15.8MB

  • Sample

    240520-m5tnmahc7t

  • MD5

    5ebc11cbd1cc4b421d41e2556ef1ad29

  • SHA1

    44d569dc0ca9beb6bb032d93695d8827b80b150f

  • SHA256

    ba2afb6a18c252886c5fbbca05801c4bc930f42a35de449656c6c6d0401f5aae

  • SHA512

    ba7845d55bd509d47d7a81e0b427a6e91933213855116e29bc3924ee52bf6b00c9f6e61abc767f8001956c00a1e0ec4eba7c2af108ef305d368af1de3693b485

  • SSDEEP

    393216:k8WtLbxfq1aop2tvi5Nt9fh2NKZoig2CUrijxY5EDKbv/jKm:oFqwop2Bi5Nrfh2NKZoMhqm

Malware Config

Targets

    • Target

      5ebc11cbd1cc4b421d41e2556ef1ad29_JaffaCakes118

    • Size

      15.8MB

    • MD5

      5ebc11cbd1cc4b421d41e2556ef1ad29

    • SHA1

      44d569dc0ca9beb6bb032d93695d8827b80b150f

    • SHA256

      ba2afb6a18c252886c5fbbca05801c4bc930f42a35de449656c6c6d0401f5aae

    • SHA512

      ba7845d55bd509d47d7a81e0b427a6e91933213855116e29bc3924ee52bf6b00c9f6e61abc767f8001956c00a1e0ec4eba7c2af108ef305d368af1de3693b485

    • SSDEEP

      393216:k8WtLbxfq1aop2tvi5Nt9fh2NKZoig2CUrijxY5EDKbv/jKm:oFqwop2Bi5Nrfh2NKZoMhqm

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks