General

  • Target

    63a83244be3f5b60da41412fd7e301a5_JaffaCakes118

  • Size

    3.4MB

  • Sample

    240521-r25c6she9y

  • MD5

    63a83244be3f5b60da41412fd7e301a5

  • SHA1

    ef6eae225470cfe8b853de6bec0125f80b4a664d

  • SHA256

    7123e8142dd776104e99c50968197c8692f0dcb0c5e46bd90f7a21fe84e7af9f

  • SHA512

    0280f57aa486b9d0cfd74d1a7bfb94ade17f1bd4e485c7521085d0fd2487847202ff8a1a10c7baed7950689bfd135a4315d84e76392a9f541c8b612252e91722

  • SSDEEP

    98304:pdGrAdMGjbRROjBFcnBa9vRQGogBB1xFQZth:pkoWOn6RuW1xOth

Malware Config

Targets

    • Target

      63a83244be3f5b60da41412fd7e301a5_JaffaCakes118

    • Size

      3.4MB

    • MD5

      63a83244be3f5b60da41412fd7e301a5

    • SHA1

      ef6eae225470cfe8b853de6bec0125f80b4a664d

    • SHA256

      7123e8142dd776104e99c50968197c8692f0dcb0c5e46bd90f7a21fe84e7af9f

    • SHA512

      0280f57aa486b9d0cfd74d1a7bfb94ade17f1bd4e485c7521085d0fd2487847202ff8a1a10c7baed7950689bfd135a4315d84e76392a9f541c8b612252e91722

    • SSDEEP

      98304:pdGrAdMGjbRROjBFcnBa9vRQGogBB1xFQZth:pkoWOn6RuW1xOth

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks