General

  • Target

    8335bb547dee3905dd7c7d36b8bffe29_JaffaCakes118

  • Size

    11.0MB

  • Sample

    240530-gjdgmagf3v

  • MD5

    8335bb547dee3905dd7c7d36b8bffe29

  • SHA1

    c5cd707777287ee350cad69b23fe68e7426bdeac

  • SHA256

    45e9c4e683847109146275de24069e2f8b62e7d87cafa8a84345eff0cfebc482

  • SHA512

    c0d01e4dd7ab69c87c663d49d31d4272754fbd0ddc2ce0b564ec40d0004d337b643321be2bd40e9094bb6a64971d46f668370a4852bbfa655960301d98bded01

  • SSDEEP

    196608:ZIg/1Hcv+0Exq6RG8d785gFM9UTpamI54rQ1oCK/amzU+mBVcCWoA:n/W+o6RG8SD9UTp+4rNBzU+mBVtWoA

Malware Config

Targets

    • Target

      8335bb547dee3905dd7c7d36b8bffe29_JaffaCakes118

    • Size

      11.0MB

    • MD5

      8335bb547dee3905dd7c7d36b8bffe29

    • SHA1

      c5cd707777287ee350cad69b23fe68e7426bdeac

    • SHA256

      45e9c4e683847109146275de24069e2f8b62e7d87cafa8a84345eff0cfebc482

    • SHA512

      c0d01e4dd7ab69c87c663d49d31d4272754fbd0ddc2ce0b564ec40d0004d337b643321be2bd40e9094bb6a64971d46f668370a4852bbfa655960301d98bded01

    • SSDEEP

      196608:ZIg/1Hcv+0Exq6RG8d785gFM9UTpamI54rQ1oCK/amzU+mBVcCWoA:n/W+o6RG8SD9UTp+4rNBzU+mBVtWoA

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks