General

  • Target

    66c8ee69035248cf355ae0826d655b5f_JaffaCakes118

  • Size

    31.8MB

  • Sample

    240522-lc75waaf8x

  • MD5

    66c8ee69035248cf355ae0826d655b5f

  • SHA1

    f5951c8fcecad3d2ba4a13406a508a74e118324d

  • SHA256

    3e08bb086cb4a9d7a8ba7b215f928690824bcc15eda3bb9696c6fc93ab24c153

  • SHA512

    cc3d1c5e2ae6aaa3bf2a556c523e20046130cd489d9d7ce7f86708b0ee5e8f9d2d98b3052358a7c4a5fba30dc205e3c72a81a550fd708ab0537ed3fd36ed92b6

  • SSDEEP

    786432:2GUoXl7pS4MUDF9FJvuP2I1ag/C/gMsu+CRtPXAdgpp:XBV7pAUVJvNEegMs+tPXAdgT

Malware Config

Targets

    • Target

      66c8ee69035248cf355ae0826d655b5f_JaffaCakes118

    • Size

      31.8MB

    • MD5

      66c8ee69035248cf355ae0826d655b5f

    • SHA1

      f5951c8fcecad3d2ba4a13406a508a74e118324d

    • SHA256

      3e08bb086cb4a9d7a8ba7b215f928690824bcc15eda3bb9696c6fc93ab24c153

    • SHA512

      cc3d1c5e2ae6aaa3bf2a556c523e20046130cd489d9d7ce7f86708b0ee5e8f9d2d98b3052358a7c4a5fba30dc205e3c72a81a550fd708ab0537ed3fd36ed92b6

    • SSDEEP

      786432:2GUoXl7pS4MUDF9FJvuP2I1ag/C/gMsu+CRtPXAdgpp:XBV7pAUVJvNEegMs+tPXAdgT

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks