General

  • Target

    b5bc278d6045195aa79fd9511b7c46e3_JaffaCakes118

  • Size

    15.2MB

  • Sample

    240616-3eq3taxejl

  • MD5

    b5bc278d6045195aa79fd9511b7c46e3

  • SHA1

    06e9f363184d7eadadb79fa72740530917cd0db1

  • SHA256

    a864d4f20ff371d40780acac95ab36438f89ef7233125e5421464f0a55657eb6

  • SHA512

    6dff1f3ba08bc9198b0045fbc33fb4402b152950d161ccbb99d6b046c2902b5477d9dbd7d3174cd27272470a649249fb4df4afc43a37a87610cbcac3dce5752c

  • SSDEEP

    393216:OjZ40N81fzmLi+CUKgvwrBuVzwmoqUYMCqz:Ojl++C99czFMCs

Malware Config

Targets

    • Target

      b5bc278d6045195aa79fd9511b7c46e3_JaffaCakes118

    • Size

      15.2MB

    • MD5

      b5bc278d6045195aa79fd9511b7c46e3

    • SHA1

      06e9f363184d7eadadb79fa72740530917cd0db1

    • SHA256

      a864d4f20ff371d40780acac95ab36438f89ef7233125e5421464f0a55657eb6

    • SHA512

      6dff1f3ba08bc9198b0045fbc33fb4402b152950d161ccbb99d6b046c2902b5477d9dbd7d3174cd27272470a649249fb4df4afc43a37a87610cbcac3dce5752c

    • SSDEEP

      393216:OjZ40N81fzmLi+CUKgvwrBuVzwmoqUYMCqz:Ojl++C99czFMCs

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks