General

  • Target

    9a4ae1c0eb39bf3297f9a0f5b8742f8d_JaffaCakes118

  • Size

    9.7MB

  • Sample

    240609-3znhesgg7w

  • MD5

    9a4ae1c0eb39bf3297f9a0f5b8742f8d

  • SHA1

    cc4dfbb72d5e6598d07f07cff804e2575aafb5c5

  • SHA256

    c41793cc6bd88b7e0cdff624c2e1ed3c9ca4bacee5e79982836e214633528f8f

  • SHA512

    b6ea7f27c45ea5e75fb9714dd79a50e0dee729a10033f9ac0971d0b9d4accdfc644fddef96574c1db7ae90370c3b9483da311d296238a9c8118fd547e95f3045

  • SSDEEP

    196608:TxVN3qMg7cPQuxQxtnoKK8It+t7EMAAVT0FJdP8mMNuCtioCtib:chcPQuxQjW8Q+t7EMAJgNTtittib

Malware Config

Targets

    • Target

      9a4ae1c0eb39bf3297f9a0f5b8742f8d_JaffaCakes118

    • Size

      9.7MB

    • MD5

      9a4ae1c0eb39bf3297f9a0f5b8742f8d

    • SHA1

      cc4dfbb72d5e6598d07f07cff804e2575aafb5c5

    • SHA256

      c41793cc6bd88b7e0cdff624c2e1ed3c9ca4bacee5e79982836e214633528f8f

    • SHA512

      b6ea7f27c45ea5e75fb9714dd79a50e0dee729a10033f9ac0971d0b9d4accdfc644fddef96574c1db7ae90370c3b9483da311d296238a9c8118fd547e95f3045

    • SSDEEP

      196608:TxVN3qMg7cPQuxQxtnoKK8It+t7EMAAVT0FJdP8mMNuCtioCtib:chcPQuxQjW8Q+t7EMAJgNTtittib

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks