General

  • Target

    b83df944ee90b006bd565c1d2c24a48c_JaffaCakes118

  • Size

    12.5MB

  • Sample

    240617-mzpgqa1frl

  • MD5

    b83df944ee90b006bd565c1d2c24a48c

  • SHA1

    3f398ef018eb9454b1bf06384bb5b55445ec0757

  • SHA256

    050b74a478b84a001b13b077d41e8c47aec8e9ba8c831916bd0bfae831841c28

  • SHA512

    5ae165525b24176938d52a6a200428eb7212fcebd4a403c35087113b8648b4834f163e9cd8378c6e453d5289a0c940b45127f7f2e1cf42ca1accdcaa2b2fa33b

  • SSDEEP

    393216:KKEUROkNoYde8sgimgtxwiPNI9jicXGjkIGMw9rZs:1MkNoYc8piXxLppuRs

Malware Config

Targets

    • Target

      b83df944ee90b006bd565c1d2c24a48c_JaffaCakes118

    • Size

      12.5MB

    • MD5

      b83df944ee90b006bd565c1d2c24a48c

    • SHA1

      3f398ef018eb9454b1bf06384bb5b55445ec0757

    • SHA256

      050b74a478b84a001b13b077d41e8c47aec8e9ba8c831916bd0bfae831841c28

    • SHA512

      5ae165525b24176938d52a6a200428eb7212fcebd4a403c35087113b8648b4834f163e9cd8378c6e453d5289a0c940b45127f7f2e1cf42ca1accdcaa2b2fa33b

    • SSDEEP

      393216:KKEUROkNoYde8sgimgtxwiPNI9jicXGjkIGMw9rZs:1MkNoYc8piXxLppuRs

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Acquires the wake lock

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests cell location

      Uses Android APIs to to get current cell information.

MITRE ATT&CK Mobile v15

Tasks