General

  • Target

    5eea667fc528af9867cfa8cdd05948d0_JaffaCakes118

  • Size

    3.4MB

  • Sample

    240520-nzwfpshh75

  • MD5

    5eea667fc528af9867cfa8cdd05948d0

  • SHA1

    6215bffef1c0aa8c9a05e5fcb6d1fc6c01db1bee

  • SHA256

    e0fc902bdaef96b3288cbd9b1741d6e4e436d0ea5c6e91258c22f4298f7290cb

  • SHA512

    f0137c14242a2471e6df50a88b9600b772a2783dc9f682b15f8e97318d27d8be64f48880572cc20afd29427416e52d10e6c5c91ed8512c2a021370e0fcbde016

  • SSDEEP

    98304:pdGrAdMGjbRROjBFcnBa9vRQGogBB1xFQZtb:pkoWOn6RuW1xOtb

Malware Config

Targets

    • Target

      5eea667fc528af9867cfa8cdd05948d0_JaffaCakes118

    • Size

      3.4MB

    • MD5

      5eea667fc528af9867cfa8cdd05948d0

    • SHA1

      6215bffef1c0aa8c9a05e5fcb6d1fc6c01db1bee

    • SHA256

      e0fc902bdaef96b3288cbd9b1741d6e4e436d0ea5c6e91258c22f4298f7290cb

    • SHA512

      f0137c14242a2471e6df50a88b9600b772a2783dc9f682b15f8e97318d27d8be64f48880572cc20afd29427416e52d10e6c5c91ed8512c2a021370e0fcbde016

    • SSDEEP

      98304:pdGrAdMGjbRROjBFcnBa9vRQGogBB1xFQZtb:pkoWOn6RuW1xOtb

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks