General

  • Target

    89302e29c052405edcf000cac8e028c6_JaffaCakes118

  • Size

    30.6MB

  • Sample

    240601-dggjqagc35

  • MD5

    89302e29c052405edcf000cac8e028c6

  • SHA1

    0f1d8f4f5f7ace7adb196e03ec3939624b858ecc

  • SHA256

    bb631d726d1339c158fdb9973e3eebcd63bc5fff1f95679395fce055855458e1

  • SHA512

    c2e4f46cea7a9800e82cda00fc761465bbeadd9e982a11f6eb8cc99148c5a2f2b11e21bf7c727d66934db2685d952fb73252367b864902df44d3b422726f1a13

  • SSDEEP

    786432:2IzcrKsPuV5G4QU1ppkadSl0BO8qqxuN6f48r4Uo2EvwKYULi/0yu95+:hAWlVUApkfcq9Np8DolvwcLibuH+

Malware Config

Targets

    • Target

      89302e29c052405edcf000cac8e028c6_JaffaCakes118

    • Size

      30.6MB

    • MD5

      89302e29c052405edcf000cac8e028c6

    • SHA1

      0f1d8f4f5f7ace7adb196e03ec3939624b858ecc

    • SHA256

      bb631d726d1339c158fdb9973e3eebcd63bc5fff1f95679395fce055855458e1

    • SHA512

      c2e4f46cea7a9800e82cda00fc761465bbeadd9e982a11f6eb8cc99148c5a2f2b11e21bf7c727d66934db2685d952fb73252367b864902df44d3b422726f1a13

    • SSDEEP

      786432:2IzcrKsPuV5G4QU1ppkadSl0BO8qqxuN6f48r4Uo2EvwKYULi/0yu95+:hAWlVUApkfcq9Np8DolvwcLibuH+

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks