General

  • Target

    f52e82129f3b737d7825a1f9e358c044_JaffaCakes118

  • Size

    10.8MB

  • Sample

    240925-e2b1eaveqm

  • MD5

    f52e82129f3b737d7825a1f9e358c044

  • SHA1

    2d751938db8ad5a720018920c59bb7e9c49328d5

  • SHA256

    528fe4266b3fe8ae0b32bab133b54534b223d7a7430266d99177ce38d5d08d48

  • SHA512

    4e9c26f2dbf72197828a7b4b7a95f8f3313f2a8186902b40e038b0f814a244a95251ac17dd8f79b0b0e19f619ec757492099033ae96cf6e2ce6a7aca328ffe9b

  • SSDEEP

    196608:L4RqGcdoFpn6EDAT6TSRmuDvZiFNSbClOx8ZbKP8E1:Iqdep46OR/diXCd

Malware Config

Targets

    • Target

      f52e82129f3b737d7825a1f9e358c044_JaffaCakes118

    • Size

      10.8MB

    • MD5

      f52e82129f3b737d7825a1f9e358c044

    • SHA1

      2d751938db8ad5a720018920c59bb7e9c49328d5

    • SHA256

      528fe4266b3fe8ae0b32bab133b54534b223d7a7430266d99177ce38d5d08d48

    • SHA512

      4e9c26f2dbf72197828a7b4b7a95f8f3313f2a8186902b40e038b0f814a244a95251ac17dd8f79b0b0e19f619ec757492099033ae96cf6e2ce6a7aca328ffe9b

    • SSDEEP

      196608:L4RqGcdoFpn6EDAT6TSRmuDvZiFNSbClOx8ZbKP8E1:Iqdep46OR/diXCd

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks