General

  • Target

    65e2e9bffc2cd5f3e62b18b6449c9141_JaffaCakes118

  • Size

    25.4MB

  • Sample

    240522-d9hmgsba8v

  • MD5

    65e2e9bffc2cd5f3e62b18b6449c9141

  • SHA1

    98630c3bb3e168a0f7044e8c05764a3cedd94321

  • SHA256

    7cead4fca3e6063f8fd7e5589e4ff9ee999c9aa89863db48c809c1c00dd13bff

  • SHA512

    8560bd2a2c73400d980b4ae3ef956b9aeabba22122e86460abaaf6e5c610aeec99bfd35d0f3f17dcd986b868c60b015394d136dd3aa01299deb867a4dee6d6e1

  • SSDEEP

    786432:qIQsTc7pSfUrzBeIvs9zvYxDmPytlE4parjz2jkHC:91wJr1eqOuDmJJHnHC

Malware Config

Targets

    • Target

      65e2e9bffc2cd5f3e62b18b6449c9141_JaffaCakes118

    • Size

      25.4MB

    • MD5

      65e2e9bffc2cd5f3e62b18b6449c9141

    • SHA1

      98630c3bb3e168a0f7044e8c05764a3cedd94321

    • SHA256

      7cead4fca3e6063f8fd7e5589e4ff9ee999c9aa89863db48c809c1c00dd13bff

    • SHA512

      8560bd2a2c73400d980b4ae3ef956b9aeabba22122e86460abaaf6e5c610aeec99bfd35d0f3f17dcd986b868c60b015394d136dd3aa01299deb867a4dee6d6e1

    • SSDEEP

      786432:qIQsTc7pSfUrzBeIvs9zvYxDmPytlE4parjz2jkHC:91wJr1eqOuDmJJHnHC

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks