General

  • Target

    701ce21351a1acea185c04c9a09a7e3c_JaffaCakes118

  • Size

    17.0MB

  • Sample

    240524-27vq2aee6t

  • MD5

    701ce21351a1acea185c04c9a09a7e3c

  • SHA1

    a214c2e54b031d46ec29209c20eae35e24944505

  • SHA256

    692baffec1fe23ae8c4d576ff78d2f6d6d6f024228e351c7c0d08d3d3ae26e11

  • SHA512

    bc26ab23ed4e68e65bcebc01673dc9f46bfbf5e48da59aca8431cf3d921b28b5385f8dd729f04493a3c05cccf8e97da2657802c4092876e27d3ad2fea8c19229

  • SSDEEP

    393216:ln6frihy/4PzAaSW43a+Ver+6MoBFEVKSZxgZFP:h6frUw4Ph9M8q6dXEVKW4Z

Malware Config

Targets

    • Target

      701ce21351a1acea185c04c9a09a7e3c_JaffaCakes118

    • Size

      17.0MB

    • MD5

      701ce21351a1acea185c04c9a09a7e3c

    • SHA1

      a214c2e54b031d46ec29209c20eae35e24944505

    • SHA256

      692baffec1fe23ae8c4d576ff78d2f6d6d6f024228e351c7c0d08d3d3ae26e11

    • SHA512

      bc26ab23ed4e68e65bcebc01673dc9f46bfbf5e48da59aca8431cf3d921b28b5385f8dd729f04493a3c05cccf8e97da2657802c4092876e27d3ad2fea8c19229

    • SSDEEP

      393216:ln6frihy/4PzAaSW43a+Ver+6MoBFEVKSZxgZFP:h6frUw4Ph9M8q6dXEVKW4Z

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads the contacts stored on the device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks