General

  • Target

    d0a6306312ec07286d7476b2059582c5_JaffaCakes118

  • Size

    11.4MB

  • Sample

    240906-3jycpatbqj

  • MD5

    d0a6306312ec07286d7476b2059582c5

  • SHA1

    f47ae33a27567ff6a6e31a2160b36899ba31dcdd

  • SHA256

    1cac63ea859f49f4a0c832502a286c1db70563ba98001271ce7975d1834d5cba

  • SHA512

    050b3e6a9c5e06660bc2d83559ab573405bfb346871dcb94fd69a127a6dfaafd12c7dae97c1adac4a7255d53dc6a11133c80d4c30644c1e757004a92c715f25d

  • SSDEEP

    196608:UKR9ckdeYuP0Dofd4MOUKMvQe6vdGRasB7EXFbtK956X+RXBQWeWgdNKcZtPm/j6:bdeKUadGR7hEXeUCX4Bd4owjMTLGrcsG

Malware Config

Targets

    • Target

      d0a6306312ec07286d7476b2059582c5_JaffaCakes118

    • Size

      11.4MB

    • MD5

      d0a6306312ec07286d7476b2059582c5

    • SHA1

      f47ae33a27567ff6a6e31a2160b36899ba31dcdd

    • SHA256

      1cac63ea859f49f4a0c832502a286c1db70563ba98001271ce7975d1834d5cba

    • SHA512

      050b3e6a9c5e06660bc2d83559ab573405bfb346871dcb94fd69a127a6dfaafd12c7dae97c1adac4a7255d53dc6a11133c80d4c30644c1e757004a92c715f25d

    • SSDEEP

      196608:UKR9ckdeYuP0Dofd4MOUKMvQe6vdGRasB7EXFbtK956X+RXBQWeWgdNKcZtPm/j6:bdeKUadGR7hEXeUCX4Bd4owjMTLGrcsG

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks