General

  • Target

    6549a2a7999b12d82df68e05651d098e_JaffaCakes118

  • Size

    3.3MB

  • Sample

    240522-adbyaaed71

  • MD5

    6549a2a7999b12d82df68e05651d098e

  • SHA1

    3459a09f7acc33d13ab644907807292bd7e4da63

  • SHA256

    255332e2c8e6d37fbf83551dc3c9ac0d421aa1ccbd5b0d1effa66d303b672667

  • SHA512

    0d395d9d5b76e2cd7f301bf622e53cd74c3b33920bb03d307ab2fe9b8ce255c38462d02c3fddabf5169b184492a0f3d7a4e90a6f67c63b9b964642074d4c03ca

  • SSDEEP

    98304:xugfuWWFkFL7EBasOqFRl8Fr24J73DwpwOtywXN3XWiBj3h:xvLWOLpEcJpXg

Malware Config

Targets

    • Target

      6549a2a7999b12d82df68e05651d098e_JaffaCakes118

    • Size

      3.3MB

    • MD5

      6549a2a7999b12d82df68e05651d098e

    • SHA1

      3459a09f7acc33d13ab644907807292bd7e4da63

    • SHA256

      255332e2c8e6d37fbf83551dc3c9ac0d421aa1ccbd5b0d1effa66d303b672667

    • SHA512

      0d395d9d5b76e2cd7f301bf622e53cd74c3b33920bb03d307ab2fe9b8ce255c38462d02c3fddabf5169b184492a0f3d7a4e90a6f67c63b9b964642074d4c03ca

    • SSDEEP

      98304:xugfuWWFkFL7EBasOqFRl8Fr24J73DwpwOtywXN3XWiBj3h:xvLWOLpEcJpXg

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks