General

  • Target

    7ab47a8138f0d59a6088e165165c6087_JaffaCakes118

  • Size

    11.0MB

  • Sample

    240527-119qyach66

  • MD5

    7ab47a8138f0d59a6088e165165c6087

  • SHA1

    1551a18945b49d48ce610ee244622a823b08675f

  • SHA256

    4cacf28cfe177667521015cd6c1eabee62922efc78a77df509df491691f5cf4f

  • SHA512

    b01b5c6861f187b0dcc7f2a2d5f2d5699d1927b4d70d819e4c8e0ba74d92a3e947d3f484afc05bed3f4926ab2b27e5acb8f32203d30294a0b14ebdbdf75ca2c7

  • SSDEEP

    196608:l5LuKjlAl1kyEHWVu0hA8hRZEF9lr4csJNyyBlcHR8dpGbhdIuGADl8PEtLx4:WKjlGSyc0Ir4XN3cHR8fGbhdIq2EtLx4

Malware Config

Targets

    • Target

      7ab47a8138f0d59a6088e165165c6087_JaffaCakes118

    • Size

      11.0MB

    • MD5

      7ab47a8138f0d59a6088e165165c6087

    • SHA1

      1551a18945b49d48ce610ee244622a823b08675f

    • SHA256

      4cacf28cfe177667521015cd6c1eabee62922efc78a77df509df491691f5cf4f

    • SHA512

      b01b5c6861f187b0dcc7f2a2d5f2d5699d1927b4d70d819e4c8e0ba74d92a3e947d3f484afc05bed3f4926ab2b27e5acb8f32203d30294a0b14ebdbdf75ca2c7

    • SSDEEP

      196608:l5LuKjlAl1kyEHWVu0hA8hRZEF9lr4csJNyyBlcHR8dpGbhdIuGADl8PEtLx4:WKjlGSyc0Ir4XN3cHR8fGbhdIq2EtLx4

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks