General

  • Target

    b57586e80e851efe0a1bba6ff5d763f0_JaffaCakes118

  • Size

    32.0MB

  • Sample

    240616-172znsvcpq

  • MD5

    b57586e80e851efe0a1bba6ff5d763f0

  • SHA1

    de262ee8863c8b90305ee75998a5fa09df79776e

  • SHA256

    b54b395ee5f2caae3b90fb7bbe7d46ad43162b088733a21e0ddcbe933fa8b617

  • SHA512

    47ac027e2d990d57c2d57232dae6d5dc9c53ff9e448e3d5285b5e9416c2e3951c7ba52e13fad122a9b91f1c155b64be4125a0b7500f7829a9bc4ac6ee95148a1

  • SSDEEP

    786432:cGvn0JV70+QYDK+/OS70gmOBhRhY3JujVo6wKXXFW6BhzDEiAQKUs:cC0n0+QYJ/OS7mOBhRGMC6VXXTXsiAQe

Malware Config

Targets

    • Target

      b57586e80e851efe0a1bba6ff5d763f0_JaffaCakes118

    • Size

      32.0MB

    • MD5

      b57586e80e851efe0a1bba6ff5d763f0

    • SHA1

      de262ee8863c8b90305ee75998a5fa09df79776e

    • SHA256

      b54b395ee5f2caae3b90fb7bbe7d46ad43162b088733a21e0ddcbe933fa8b617

    • SHA512

      47ac027e2d990d57c2d57232dae6d5dc9c53ff9e448e3d5285b5e9416c2e3951c7ba52e13fad122a9b91f1c155b64be4125a0b7500f7829a9bc4ac6ee95148a1

    • SSDEEP

      786432:cGvn0JV70+QYDK+/OS70gmOBhRhY3JujVo6wKXXFW6BhzDEiAQKUs:cC0n0+QYJ/OS7mOBhRGMC6VXXTXsiAQe

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks