General

  • Target

    b66b0247e9e3b47952002ecb34564b5e_JaffaCakes118

  • Size

    2.7MB

  • Sample

    240617-c7t23avdql

  • MD5

    b66b0247e9e3b47952002ecb34564b5e

  • SHA1

    209157686966487471e9d20af9214d97a858d9ff

  • SHA256

    b5f543fdf74e6d0b3fc45586843db4b481fd733415845aabb777b8a1c3941307

  • SHA512

    e7eff99fcb674214022ef76b637e5fd55410fdb2391ec9ab73f33825fc47723fbe6463a7b40ecfed0e02923ad3320352b432a71871134bd83847b0a53bbe2ae2

  • SSDEEP

    49152:oG3jXbqLV6kE3GUpatsnAOoEQOdT7o7Em1IcaOVmE8LuoNMlAb7AzQzJlhmG4W9/:oG3jmLV6ItsnAOoql7AlCc9VoLuoqlAD

Malware Config

Targets

    • Target

      b66b0247e9e3b47952002ecb34564b5e_JaffaCakes118

    • Size

      2.7MB

    • MD5

      b66b0247e9e3b47952002ecb34564b5e

    • SHA1

      209157686966487471e9d20af9214d97a858d9ff

    • SHA256

      b5f543fdf74e6d0b3fc45586843db4b481fd733415845aabb777b8a1c3941307

    • SHA512

      e7eff99fcb674214022ef76b637e5fd55410fdb2391ec9ab73f33825fc47723fbe6463a7b40ecfed0e02923ad3320352b432a71871134bd83847b0a53bbe2ae2

    • SSDEEP

      49152:oG3jXbqLV6kE3GUpatsnAOoEQOdT7o7Em1IcaOVmE8LuoNMlAb7AzQzJlhmG4W9/:oG3jmLV6ItsnAOoql7AlCc9VoLuoqlAD

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks