General

  • Target

    0b3c35cd0098ce446edee9cb11f9d87c_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240624-3dch2axflh

  • MD5

    0b3c35cd0098ce446edee9cb11f9d87c

  • SHA1

    47124ba43be80185945f326103628bcab2fdab36

  • SHA256

    3e2b8f1faa2db0d851e2cb07401b41e3869d89453baa30e95110cf1bd9081781

  • SHA512

    8b472043fb3467cc5596b10755091b527f93cdc2c46ad1f0834e207fb4fcad7bb805b33789c2161e4071ff97357da7b915ff092cc64fe7626b5949274bfd283d

  • SSDEEP

    12288:5pyeyxyey0JQbN+NORpfDGJMwTBFH9gw2q8CPLwaJQwWie2TF/qX1AEKTaUOd8sN:5AJgNgKJDGJMwNxNbj0kF4AEKOPy9k

Malware Config

Targets

    • Target

      0b3c35cd0098ce446edee9cb11f9d87c_JaffaCakes118

    • Size

      1.1MB

    • MD5

      0b3c35cd0098ce446edee9cb11f9d87c

    • SHA1

      47124ba43be80185945f326103628bcab2fdab36

    • SHA256

      3e2b8f1faa2db0d851e2cb07401b41e3869d89453baa30e95110cf1bd9081781

    • SHA512

      8b472043fb3467cc5596b10755091b527f93cdc2c46ad1f0834e207fb4fcad7bb805b33789c2161e4071ff97357da7b915ff092cc64fe7626b5949274bfd283d

    • SSDEEP

      12288:5pyeyxyey0JQbN+NORpfDGJMwTBFH9gw2q8CPLwaJQwWie2TF/qX1AEKTaUOd8sN:5AJgNgKJDGJMwNxNbj0kF4AEKOPy9k

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks