General

  • Target

    43b29c91a6cb048c5e7dbc7a0da2cb6f_JaffaCakes118

  • Size

    28.6MB

  • Sample

    240713-3jqb3s1bnq

  • MD5

    43b29c91a6cb048c5e7dbc7a0da2cb6f

  • SHA1

    b12e1156c6da5e251d1dd0ce0db732acb42b5891

  • SHA256

    35d582648bd0993edae21aaa893905885bd88ff669370cfa25e16535381e7850

  • SHA512

    6613c7cac2932df9fd046fc37352a82026029a72d55e6fb5157e1072ebd1108625a0cf8d3662468dea42a4c4ddb13e4f2155a14518fa86d2a41cbbce3bddd27a

  • SSDEEP

    786432:bW/YR3VtWESjJGhwUDRZv58c0+owaFbrf0P/XV:77WTJCDrNkbFbrsPfV

Malware Config

Targets

    • Target

      43b29c91a6cb048c5e7dbc7a0da2cb6f_JaffaCakes118

    • Size

      28.6MB

    • MD5

      43b29c91a6cb048c5e7dbc7a0da2cb6f

    • SHA1

      b12e1156c6da5e251d1dd0ce0db732acb42b5891

    • SHA256

      35d582648bd0993edae21aaa893905885bd88ff669370cfa25e16535381e7850

    • SHA512

      6613c7cac2932df9fd046fc37352a82026029a72d55e6fb5157e1072ebd1108625a0cf8d3662468dea42a4c4ddb13e4f2155a14518fa86d2a41cbbce3bddd27a

    • SSDEEP

      786432:bW/YR3VtWESjJGhwUDRZv58c0+owaFbrf0P/XV:77WTJCDrNkbFbrsPfV

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks