General

  • Target

    b68f88b32b11311a1b6066fd25a2e763_JaffaCakes118

  • Size

    30.9MB

  • Sample

    240617-d4w8pawglk

  • MD5

    b68f88b32b11311a1b6066fd25a2e763

  • SHA1

    549fa4157a9e0983ef7ff120c771942e7e69e0df

  • SHA256

    5f4aec9d9283f491a5ba5a0cbf448bf25de49712eef79d68044b016160b5ae7e

  • SHA512

    978e6efd8c0296e85ba6e72c4031c3155c6ffd1419d130503205d5f7276690c91596abe8e71ab6f5a08e45ff99f3059bb0db24f62eac2c3571258b9b804b5c45

  • SSDEEP

    786432:mX+/usfnqG/awrTlVYWT7ibLi4rtkgxGQquod3dhwJ4tigHjWZ:mu7fP/hrTleWTO/ietkgxGQq9ThwitiP

Malware Config

Targets

    • Target

      b68f88b32b11311a1b6066fd25a2e763_JaffaCakes118

    • Size

      30.9MB

    • MD5

      b68f88b32b11311a1b6066fd25a2e763

    • SHA1

      549fa4157a9e0983ef7ff120c771942e7e69e0df

    • SHA256

      5f4aec9d9283f491a5ba5a0cbf448bf25de49712eef79d68044b016160b5ae7e

    • SHA512

      978e6efd8c0296e85ba6e72c4031c3155c6ffd1419d130503205d5f7276690c91596abe8e71ab6f5a08e45ff99f3059bb0db24f62eac2c3571258b9b804b5c45

    • SSDEEP

      786432:mX+/usfnqG/awrTlVYWT7ibLi4rtkgxGQquod3dhwJ4tigHjWZ:mu7fP/hrTleWTO/ietkgxGQq9ThwitiP

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks