General

  • Target

    a0f0e92f7f272cc485077c6000fb06d2_JaffaCakes118

  • Size

    31.6MB

  • Sample

    240612-rfwh5s1fpk

  • MD5

    a0f0e92f7f272cc485077c6000fb06d2

  • SHA1

    9105f9f42c8a442ad1efae0e16e81df61b38aff0

  • SHA256

    508729d1e99f667242e427a34d74601eb0fd51e6c2024e2c7d238be689db8171

  • SHA512

    c3e03035700a2b3f9dec97c4413dfc2caf8caba3dd64096eae26d0701c86f0642a95c1feb2dd2448189d31e5cd6465fff65c3c6605b478b4e585a28aa08b74d6

  • SSDEEP

    786432:VsaoGOqK6b8JnORRLUqbjDYy5RLRLQ9t2eBGx3oxcGA0CEfDibA8CTMSd:veqv2niLHnDDfL2w4xl3rB8CTMSd

Malware Config

Targets

    • Target

      a0f0e92f7f272cc485077c6000fb06d2_JaffaCakes118

    • Size

      31.6MB

    • MD5

      a0f0e92f7f272cc485077c6000fb06d2

    • SHA1

      9105f9f42c8a442ad1efae0e16e81df61b38aff0

    • SHA256

      508729d1e99f667242e427a34d74601eb0fd51e6c2024e2c7d238be689db8171

    • SHA512

      c3e03035700a2b3f9dec97c4413dfc2caf8caba3dd64096eae26d0701c86f0642a95c1feb2dd2448189d31e5cd6465fff65c3c6605b478b4e585a28aa08b74d6

    • SSDEEP

      786432:VsaoGOqK6b8JnORRLUqbjDYy5RLRLQ9t2eBGx3oxcGA0CEfDibA8CTMSd:veqv2niLHnDDfL2w4xl3rB8CTMSd

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks