General

  • Target

    17b550b857afa34e22de97352e5e4bcc_JaffaCakes118

  • Size

    8.5MB

  • Sample

    240728-t229xssfll

  • MD5

    17b550b857afa34e22de97352e5e4bcc

  • SHA1

    023d949c000d3f2a4ca8175e5123e5fdc81e0bdd

  • SHA256

    5ad64a6117b913444409c5a50500d8cadcab23acca6b08e100b379308dcc738f

  • SHA512

    175934d6d62c4c3d8d0b85079ed092413fcf9740c127405d1172450866f57f6b8ad5040aa9282a0a0a878ff29c78011f6cdd03ad17ab5324850889242bbc3368

  • SSDEEP

    196608:lEnQbsmMdsETgq+6dDylRy9ErsGsS50IQ68k0w4IiqNJ758kApL8u:uQtdEsqxyLy93S50IQ68k09IiqNhCTz

Malware Config

Targets

    • Target

      17b550b857afa34e22de97352e5e4bcc_JaffaCakes118

    • Size

      8.5MB

    • MD5

      17b550b857afa34e22de97352e5e4bcc

    • SHA1

      023d949c000d3f2a4ca8175e5123e5fdc81e0bdd

    • SHA256

      5ad64a6117b913444409c5a50500d8cadcab23acca6b08e100b379308dcc738f

    • SHA512

      175934d6d62c4c3d8d0b85079ed092413fcf9740c127405d1172450866f57f6b8ad5040aa9282a0a0a878ff29c78011f6cdd03ad17ab5324850889242bbc3368

    • SSDEEP

      196608:lEnQbsmMdsETgq+6dDylRy9ErsGsS50IQ68k0w4IiqNJ758kApL8u:uQtdEsqxyLy93S50IQ68k09IiqNhCTz

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Acquires the wake lock

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests cell location

      Uses Android APIs to to get current cell information.

MITRE ATT&CK Mobile v15

Tasks