General

  • Target

    8272a45a18aae5917ca724f52653f392_JaffaCakes118

  • Size

    31.0MB

  • Sample

    240530-adpjdaga44

  • MD5

    8272a45a18aae5917ca724f52653f392

  • SHA1

    83536c59f96c549671d39bb9d497cc727e5b66e4

  • SHA256

    04af0e68227027a8344f4a0e5b40d6260b28ba336ee3d94fc73ff8b1249ec144

  • SHA512

    1cf9c4d364522dab9a295578b47e839406a5219c6c7ca1055e235ad2036ee89364331c0f1dd6bef83d26f59801baaa54652cf2e453bba3ca4e35596e948485e9

  • SSDEEP

    786432:SDLiWSxiGqJ5u1+oAdUZlQcOJFFy9L33JSdlNrxxnB8NJoi:41T1jZKlQccFy9b3MdjxxB8N1

Malware Config

Targets

    • Target

      8272a45a18aae5917ca724f52653f392_JaffaCakes118

    • Size

      31.0MB

    • MD5

      8272a45a18aae5917ca724f52653f392

    • SHA1

      83536c59f96c549671d39bb9d497cc727e5b66e4

    • SHA256

      04af0e68227027a8344f4a0e5b40d6260b28ba336ee3d94fc73ff8b1249ec144

    • SHA512

      1cf9c4d364522dab9a295578b47e839406a5219c6c7ca1055e235ad2036ee89364331c0f1dd6bef83d26f59801baaa54652cf2e453bba3ca4e35596e948485e9

    • SSDEEP

      786432:SDLiWSxiGqJ5u1+oAdUZlQcOJFFy9L33JSdlNrxxnB8NJoi:41T1jZKlQccFy9b3MdjxxB8N1

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks