General

  • Target

    68d17d527a3cbd38b3047da6535e907e_JaffaCakes118

  • Size

    11.0MB

  • Sample

    240522-15a36sag6z

  • MD5

    68d17d527a3cbd38b3047da6535e907e

  • SHA1

    874ca266431a8acc8611db3ec08d3c073caabc60

  • SHA256

    ed5228fa94c20a010d16274a0a2d39be979dd2d6556ed39b29b326c7091f8e77

  • SHA512

    0b620296afe5f813dda8bada13d39ca063ecc3465af3c65952038c2371adf7805a9e4e5f417329d9de25e21720e8ee2f9f710fbaa6fce204184b37e55124789b

  • SSDEEP

    196608:NNv4ZPGSTEAK93MEx7E8bZYFpIRmFsdpPRCUNNvLafWMah3EYAbZGP:L4h3mMy7bZYFpitTNvEpihCY

Malware Config

Targets

    • Target

      68d17d527a3cbd38b3047da6535e907e_JaffaCakes118

    • Size

      11.0MB

    • MD5

      68d17d527a3cbd38b3047da6535e907e

    • SHA1

      874ca266431a8acc8611db3ec08d3c073caabc60

    • SHA256

      ed5228fa94c20a010d16274a0a2d39be979dd2d6556ed39b29b326c7091f8e77

    • SHA512

      0b620296afe5f813dda8bada13d39ca063ecc3465af3c65952038c2371adf7805a9e4e5f417329d9de25e21720e8ee2f9f710fbaa6fce204184b37e55124789b

    • SSDEEP

      196608:NNv4ZPGSTEAK93MEx7E8bZYFpIRmFsdpPRCUNNvLafWMah3EYAbZGP:L4h3mMy7bZYFpitTNvEpihCY

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks