General

  • Target

    7ac38584aa7a70e9be9fe86c8f9ffb7d_JaffaCakes118

  • Size

    10.9MB

  • Sample

    240527-2epz3sde25

  • MD5

    7ac38584aa7a70e9be9fe86c8f9ffb7d

  • SHA1

    84124cca52301bee3068f45505721a9b21f73eba

  • SHA256

    e0c423b7aba9f31b5dac46094c639eb611cccc27a217639733ab30e60dfd33a2

  • SHA512

    3379ae6954168fec8703a72fd9d75daa588812ba7cae03f19fdca7bb1d0db438ad7e19d82b6a0283ccaeab2141daf465d96e4b9625624d2a5c139a1fd2dcc070

  • SSDEEP

    196608:xPB3xMKrWjuCKuUEjQIyUlyEoXS1fvNdlXen28WM:xPvWjuYUE8IyYqX6fVuOM

Malware Config

Targets

    • Target

      7ac38584aa7a70e9be9fe86c8f9ffb7d_JaffaCakes118

    • Size

      10.9MB

    • MD5

      7ac38584aa7a70e9be9fe86c8f9ffb7d

    • SHA1

      84124cca52301bee3068f45505721a9b21f73eba

    • SHA256

      e0c423b7aba9f31b5dac46094c639eb611cccc27a217639733ab30e60dfd33a2

    • SHA512

      3379ae6954168fec8703a72fd9d75daa588812ba7cae03f19fdca7bb1d0db438ad7e19d82b6a0283ccaeab2141daf465d96e4b9625624d2a5c139a1fd2dcc070

    • SSDEEP

      196608:xPB3xMKrWjuCKuUEjQIyUlyEoXS1fvNdlXen28WM:xPvWjuYUE8IyYqX6fVuOM

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks