General

  • Target

    658b3a879bf62ba834c9f88584b3f75c_JaffaCakes118

  • Size

    2.0MB

  • Sample

    240522-bz6kfsgb73

  • MD5

    658b3a879bf62ba834c9f88584b3f75c

  • SHA1

    f88594daf606bd4d02cee20e70794eb744d8c229

  • SHA256

    8397963b67b7c9407686038333c665852d53c8e817c6fbbcd3a3a92aab4dd71e

  • SHA512

    d433f66f97f116085e20021e0c2a2beb0e6d11be5a23ba5f3d42a84e12bd065ce47179c758f16ce27d9a39d586b24b37ccaaa7f985d2233bd36e3b40a564f2e3

  • SSDEEP

    49152:YnfRTi71fZR7h9AyJAULvsegiW0Hz1YfL+bmEwMF0ifd1llS1SyI0HjsfigVGk1:E5m7fBnAyJAULvKZ0T1YfL+1FF0iV13n

Malware Config

Targets

    • Target

      658b3a879bf62ba834c9f88584b3f75c_JaffaCakes118

    • Size

      2.0MB

    • MD5

      658b3a879bf62ba834c9f88584b3f75c

    • SHA1

      f88594daf606bd4d02cee20e70794eb744d8c229

    • SHA256

      8397963b67b7c9407686038333c665852d53c8e817c6fbbcd3a3a92aab4dd71e

    • SHA512

      d433f66f97f116085e20021e0c2a2beb0e6d11be5a23ba5f3d42a84e12bd065ce47179c758f16ce27d9a39d586b24b37ccaaa7f985d2233bd36e3b40a564f2e3

    • SSDEEP

      49152:YnfRTi71fZR7h9AyJAULvsegiW0Hz1YfL+bmEwMF0ifd1llS1SyI0HjsfigVGk1:E5m7fBnAyJAULvKZ0T1YfL+1FF0iV13n

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks