General

  • Target

    6e70900c2d251d59d2c8441f8ad3436d_JaffaCakes118

  • Size

    3.4MB

  • Sample

    240524-n51bvaha8y

  • MD5

    6e70900c2d251d59d2c8441f8ad3436d

  • SHA1

    08f87c9c3bbed81dcc3a934d64ddd4d574e34cc5

  • SHA256

    823cd7d1b3555671c02b60c884315815af626846996bc74f492124c2b3e0b3b8

  • SHA512

    ff4786d6dc5748ce2cf86deb0dba8f288ee4cf3d257bbbca6d5b822067c1580fbc51b60c2ce9aad4c84a75c379b08141a93992d2f79e69fde7ff89ab124f354d

  • SSDEEP

    49152:oDxxxx7bEU8qDlmLYNIadK86tmbtBChtLPgCDUQ7+k8nMoYEuwuXe3DzPN/iRZwp:ovDlVNU8LtYhtkC/7+k8nMoNaezzPFT

Malware Config

Targets

    • Target

      6e70900c2d251d59d2c8441f8ad3436d_JaffaCakes118

    • Size

      3.4MB

    • MD5

      6e70900c2d251d59d2c8441f8ad3436d

    • SHA1

      08f87c9c3bbed81dcc3a934d64ddd4d574e34cc5

    • SHA256

      823cd7d1b3555671c02b60c884315815af626846996bc74f492124c2b3e0b3b8

    • SHA512

      ff4786d6dc5748ce2cf86deb0dba8f288ee4cf3d257bbbca6d5b822067c1580fbc51b60c2ce9aad4c84a75c379b08141a93992d2f79e69fde7ff89ab124f354d

    • SSDEEP

      49152:oDxxxx7bEU8qDlmLYNIadK86tmbtBChtLPgCDUQ7+k8nMoYEuwuXe3DzPN/iRZwp:ovDlVNU8LtYhtkC/7+k8nMoNaezzPFT

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks