General

  • Target

    9297e44ef16592f44d43b95017f80f00_JaffaCakes118

  • Size

    2.4MB

  • Sample

    240603-vyb41ade5v

  • MD5

    9297e44ef16592f44d43b95017f80f00

  • SHA1

    ffba841687da18d1babe1d5d837e65e9c03d075a

  • SHA256

    3015587ad1e8ac8c0fae8df39aa9fa30d16802e798d1685cf359de8d0aa1ee67

  • SHA512

    026be0a8a1babcc247de78ab06902d9688982d5cf16348bba3e7a8aba0ff36a2bc3468275f626a27d1f2793d97694662210bf2d7cadf64481110cdafa239c8da

  • SSDEEP

    49152:/sRAfQkBp7hTFvkwyCImzuelCGPuUIIim3FH8dV4W6YJPDHfmG8:/f3n7lF8lTcuel1753FVW6YJbut

Malware Config

Targets

    • Target

      9297e44ef16592f44d43b95017f80f00_JaffaCakes118

    • Size

      2.4MB

    • MD5

      9297e44ef16592f44d43b95017f80f00

    • SHA1

      ffba841687da18d1babe1d5d837e65e9c03d075a

    • SHA256

      3015587ad1e8ac8c0fae8df39aa9fa30d16802e798d1685cf359de8d0aa1ee67

    • SHA512

      026be0a8a1babcc247de78ab06902d9688982d5cf16348bba3e7a8aba0ff36a2bc3468275f626a27d1f2793d97694662210bf2d7cadf64481110cdafa239c8da

    • SSDEEP

      49152:/sRAfQkBp7hTFvkwyCImzuelCGPuUIIim3FH8dV4W6YJPDHfmG8:/f3n7lF8lTcuel1753FVW6YJbut

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the phone number (MSISDN for GSM devices)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks