General

  • Target

    63a6cdbf449edc1a614257ccbb0e79d2_JaffaCakes118

  • Size

    30.6MB

  • Sample

    240521-r17rxahd48

  • MD5

    63a6cdbf449edc1a614257ccbb0e79d2

  • SHA1

    22db4a0ace4b9359aa21a0ec1f04f1cff07f1f75

  • SHA256

    7e0fcd58f062d6e063ddb2513fea4c2243faaf2df3280d102222d6cc9cd6a840

  • SHA512

    a645e549730736dfd4a9f4aa4f780881611925a866a0e93ba8637a4114915911b45023e2474ba72aea09dec0c0536afcafb2af079aab0abf7d817c17eb1d1c11

  • SSDEEP

    786432:FZywWB0fEE2MS/2s5tlk9TabG5D9UTbvTE:XypB0S9g7aI

Malware Config

Targets

    • Target

      63a6cdbf449edc1a614257ccbb0e79d2_JaffaCakes118

    • Size

      30.6MB

    • MD5

      63a6cdbf449edc1a614257ccbb0e79d2

    • SHA1

      22db4a0ace4b9359aa21a0ec1f04f1cff07f1f75

    • SHA256

      7e0fcd58f062d6e063ddb2513fea4c2243faaf2df3280d102222d6cc9cd6a840

    • SHA512

      a645e549730736dfd4a9f4aa4f780881611925a866a0e93ba8637a4114915911b45023e2474ba72aea09dec0c0536afcafb2af079aab0abf7d817c17eb1d1c11

    • SSDEEP

      786432:FZywWB0fEE2MS/2s5tlk9TabG5D9UTbvTE:XypB0S9g7aI

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks