General

  • Target

    65a8d82c3345c61032f424725295de2f_JaffaCakes118

  • Size

    23.2MB

  • Sample

    240522-cpvwmshc7x

  • MD5

    65a8d82c3345c61032f424725295de2f

  • SHA1

    454fcdd7890cf17e085a770ba734b9e96e34a095

  • SHA256

    c3b102f175af57b837b3778c5f3cb6871e4c108f055437aecd13e3f709fd6f20

  • SHA512

    d14a4d3d60c61357c68f78dda487ae221fad91bd8be4f2933f97d93c302083c8c74990db17b642b67c6fd890c6dff8096a90a7ec7d40863d1c2adebc7889ea4b

  • SSDEEP

    393216:F8qqJFk+1mWhkaW625c12noLqrOALnepYnDRACNQtd4kUP1yOAfd7J480ZAen09U:mFk+1mWhkat25c12noLq/epQDZ2tkyOR

Malware Config

Targets

    • Target

      65a8d82c3345c61032f424725295de2f_JaffaCakes118

    • Size

      23.2MB

    • MD5

      65a8d82c3345c61032f424725295de2f

    • SHA1

      454fcdd7890cf17e085a770ba734b9e96e34a095

    • SHA256

      c3b102f175af57b837b3778c5f3cb6871e4c108f055437aecd13e3f709fd6f20

    • SHA512

      d14a4d3d60c61357c68f78dda487ae221fad91bd8be4f2933f97d93c302083c8c74990db17b642b67c6fd890c6dff8096a90a7ec7d40863d1c2adebc7889ea4b

    • SSDEEP

      393216:F8qqJFk+1mWhkaW625c12noLqrOALnepYnDRACNQtd4kUP1yOAfd7J480ZAen09U:mFk+1mWhkat25c12noLq/epQDZ2tkyOR

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks