General

  • Target

    b1d528b002124a7a24bf26f3fe678cdc_JaffaCakes118

  • Size

    3.3MB

  • Sample

    240616-fmxh8s1alh

  • MD5

    b1d528b002124a7a24bf26f3fe678cdc

  • SHA1

    3ba6f71cd08f585614b6b2a2917fd46cec389e83

  • SHA256

    68b9ffd0fc69e900672199f26b108812c6f145a2e8b8bf732506d4b94e1a32d9

  • SHA512

    06979c7cb4b17c8bf64fa1e37bf4ef659fe99cf0227e703525cea6966cadce173b0c3421ad37e353a51b303280ab506e6fd00b04c63bac3330fed071a4592343

  • SSDEEP

    98304:+mC9c74JNHb6j+v3vJ+4x+SOCKk3GkJ2aqxVDueo2lMtmD1lpf3Iv9rs:U16jQWVDbUmD

Malware Config

Targets

    • Target

      b1d528b002124a7a24bf26f3fe678cdc_JaffaCakes118

    • Size

      3.3MB

    • MD5

      b1d528b002124a7a24bf26f3fe678cdc

    • SHA1

      3ba6f71cd08f585614b6b2a2917fd46cec389e83

    • SHA256

      68b9ffd0fc69e900672199f26b108812c6f145a2e8b8bf732506d4b94e1a32d9

    • SHA512

      06979c7cb4b17c8bf64fa1e37bf4ef659fe99cf0227e703525cea6966cadce173b0c3421ad37e353a51b303280ab506e6fd00b04c63bac3330fed071a4592343

    • SSDEEP

      98304:+mC9c74JNHb6j+v3vJ+4x+SOCKk3GkJ2aqxVDueo2lMtmD1lpf3Iv9rs:U16jQWVDbUmD

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks