General

  • Target

    65865d3149fd4df49359fcac49dfde5f_JaffaCakes118

  • Size

    2.4MB

  • Sample

    240522-bv7lysgb9v

  • MD5

    65865d3149fd4df49359fcac49dfde5f

  • SHA1

    eedef61f6bc1cb48771e80d4f962b8ad4469567b

  • SHA256

    181c481d413988035e16c14a89376367a10be98d320167a2658a2db66056ed7a

  • SHA512

    3d507b88363bd4bac9eb8314231630afa0115b84d8eb6a76fecb7b75a03889dff2659876a2b462beee0265ab5de7007a540eacc710b734a9587601bcf43e48b1

  • SSDEEP

    49152:Ud2ZpfP/+6plv5L7MuUWL/IF+g6Rf8+cHqyi1tqmx1sahZkLDGZYrYWom:Jb3/rplxCWx5bcd8t5xWIZkLD2Wom

Malware Config

Targets

    • Target

      65865d3149fd4df49359fcac49dfde5f_JaffaCakes118

    • Size

      2.4MB

    • MD5

      65865d3149fd4df49359fcac49dfde5f

    • SHA1

      eedef61f6bc1cb48771e80d4f962b8ad4469567b

    • SHA256

      181c481d413988035e16c14a89376367a10be98d320167a2658a2db66056ed7a

    • SHA512

      3d507b88363bd4bac9eb8314231630afa0115b84d8eb6a76fecb7b75a03889dff2659876a2b462beee0265ab5de7007a540eacc710b734a9587601bcf43e48b1

    • SSDEEP

      49152:Ud2ZpfP/+6plv5L7MuUWL/IF+g6Rf8+cHqyi1tqmx1sahZkLDGZYrYWom:Jb3/rplxCWx5bcd8t5xWIZkLD2Wom

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks