General

  • Target

    9928a625fc65d42fdc29b82280b27df5_JaffaCakes118

  • Size

    4.6MB

  • Sample

    240605-y7jf8agf6x

  • MD5

    9928a625fc65d42fdc29b82280b27df5

  • SHA1

    f214503df5b7d735cdb8809566936a2e03d8e339

  • SHA256

    9272b8b9a16d6ef82194502d4a3ac01d939c9382fadf5972844ba59f12c59784

  • SHA512

    449b7a5bf7436d32ca0e4b4f58c666dc0415a28821441e8ad5cad201c726f8ab1ba7b29cdf5b6c8f6f6429a9fd34334d24de5d6015ded9f54db0a1144e1fe61e

  • SSDEEP

    49152:j3+2qoMaytw9QlpXoOEDAFI7y7Kf+SkF2R8t9nWygRCf0M0ZA6R21waH/Z70KFoL:CWzDAFIurdyQ0ydaMwafNHvB0isEohLX

Malware Config

Targets

    • Target

      9928a625fc65d42fdc29b82280b27df5_JaffaCakes118

    • Size

      4.6MB

    • MD5

      9928a625fc65d42fdc29b82280b27df5

    • SHA1

      f214503df5b7d735cdb8809566936a2e03d8e339

    • SHA256

      9272b8b9a16d6ef82194502d4a3ac01d939c9382fadf5972844ba59f12c59784

    • SHA512

      449b7a5bf7436d32ca0e4b4f58c666dc0415a28821441e8ad5cad201c726f8ab1ba7b29cdf5b6c8f6f6429a9fd34334d24de5d6015ded9f54db0a1144e1fe61e

    • SSDEEP

      49152:j3+2qoMaytw9QlpXoOEDAFI7y7Kf+SkF2R8t9nWygRCf0M0ZA6R21waH/Z70KFoL:CWzDAFIurdyQ0ydaMwafNHvB0isEohLX

    • Checks Android system properties for emulator presence.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks