General

  • Target

    89c313f28b63ad9ac35cef1112139313_JaffaCakes118

  • Size

    865KB

  • Sample

    240601-jd6mbseh89

  • MD5

    89c313f28b63ad9ac35cef1112139313

  • SHA1

    59327f03b70feff03a88f797b26279eb1229d8a2

  • SHA256

    9b198986938166b34ea0cbe516e48e542c1e2e756269db53487fb47ec0d320a3

  • SHA512

    329defec5e321e4757a29ef0edbc3d920d8ecedba2f8e854189c55ac11ac1779dbcebc7b374e1a789d6c6b32eda8ff764bcfdb279f667b7b82ffa36c2b76d6ef

  • SSDEEP

    24576:KS4S17JH43TVFcYhF2b1YH4xa+nIV14Rf:t4+xqfcYhF2biH4Bmeh

Malware Config

Targets

    • Target

      89c313f28b63ad9ac35cef1112139313_JaffaCakes118

    • Size

      865KB

    • MD5

      89c313f28b63ad9ac35cef1112139313

    • SHA1

      59327f03b70feff03a88f797b26279eb1229d8a2

    • SHA256

      9b198986938166b34ea0cbe516e48e542c1e2e756269db53487fb47ec0d320a3

    • SHA512

      329defec5e321e4757a29ef0edbc3d920d8ecedba2f8e854189c55ac11ac1779dbcebc7b374e1a789d6c6b32eda8ff764bcfdb279f667b7b82ffa36c2b76d6ef

    • SSDEEP

      24576:KS4S17JH43TVFcYhF2b1YH4xa+nIV14Rf:t4+xqfcYhF2biH4Bmeh

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Reads the content of SMS inbox messages.

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks