General

  • Target

    a9537571455f5e527be068fdc3c8e17b_JaffaCakes118

  • Size

    4.7MB

  • Sample

    240614-m4kz4axfrh

  • MD5

    a9537571455f5e527be068fdc3c8e17b

  • SHA1

    325707dbcd3f6320ce99c4df2440a8b2368ce024

  • SHA256

    4bf1062f7d397422a7ca9d5053c8425210aff45968759b41474119ff8f226d76

  • SHA512

    c046397f97d0ea4f4eae87e974b4c87029ed7426b9f12da3cca24697a0e49a4f59b3710118799467200aadfc630752be5c38f94eea1dc7b439c271a389ae226c

  • SSDEEP

    98304:HHafc4//i3tWaVgFaX36mkuKPVmP37yZUJKMtXVbCdo1ilc268fSJRX++5Qu:HHI/iBKFaXSUGZUKMrnw626tvXfL

Malware Config

Targets

    • Target

      a9537571455f5e527be068fdc3c8e17b_JaffaCakes118

    • Size

      4.7MB

    • MD5

      a9537571455f5e527be068fdc3c8e17b

    • SHA1

      325707dbcd3f6320ce99c4df2440a8b2368ce024

    • SHA256

      4bf1062f7d397422a7ca9d5053c8425210aff45968759b41474119ff8f226d76

    • SHA512

      c046397f97d0ea4f4eae87e974b4c87029ed7426b9f12da3cca24697a0e49a4f59b3710118799467200aadfc630752be5c38f94eea1dc7b439c271a389ae226c

    • SSDEEP

      98304:HHafc4//i3tWaVgFaX36mkuKPVmP37yZUJKMtXVbCdo1ilc268fSJRX++5Qu:HHI/iBKFaXSUGZUKMrnw626tvXfL

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks