General

  • Target

    eaa96bea86136a1ec557d1116ec29df0_JaffaCakes118

  • Size

    8.2MB

  • Sample

    240919-f2aysasfmd

  • MD5

    eaa96bea86136a1ec557d1116ec29df0

  • SHA1

    27148d2efedd6157135532159fcb5a064892abcf

  • SHA256

    3f242b0fbd72c54a97a66a7c61bb4272df0b4f2d8a4fc55178bc1d2a8b125bcf

  • SHA512

    37e38aa51aeeec2a77762da5db81893e888660e50cd80ba6288f785c1397b23962a45536ea8a368bf4abc11032d91ab374c4ed2e6b46e14fda0dd01bd21ddc83

  • SSDEEP

    196608:mmTlY5Fzqd8i+gaG06ikbimxLZl4uZtBITHR8dpGbSVZzF:mmTlY5lvgaG06ikbTxjOHR8fGb4Zx

Malware Config

Targets

    • Target

      eaa96bea86136a1ec557d1116ec29df0_JaffaCakes118

    • Size

      8.2MB

    • MD5

      eaa96bea86136a1ec557d1116ec29df0

    • SHA1

      27148d2efedd6157135532159fcb5a064892abcf

    • SHA256

      3f242b0fbd72c54a97a66a7c61bb4272df0b4f2d8a4fc55178bc1d2a8b125bcf

    • SHA512

      37e38aa51aeeec2a77762da5db81893e888660e50cd80ba6288f785c1397b23962a45536ea8a368bf4abc11032d91ab374c4ed2e6b46e14fda0dd01bd21ddc83

    • SSDEEP

      196608:mmTlY5Fzqd8i+gaG06ikbimxLZl4uZtBITHR8dpGbSVZzF:mmTlY5lvgaG06ikbTxjOHR8fGb4Zx

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks