General

  • Target

    03e6cdbb512d161e7ad32f8b43d25020_JaffaCakes118

  • Size

    969KB

  • Sample

    241001-bxzdcsyckb

  • MD5

    03e6cdbb512d161e7ad32f8b43d25020

  • SHA1

    9f12e33d55f42233227980c22d60d1c93da43446

  • SHA256

    0122ae0e4c94651c5787b9ce8317aa0b7f329e5b8b256097feecf9b3e21d03cc

  • SHA512

    7aa8a0e37e8621567af5959493ca09f6a05f93a1bfca5f34a5f383def9debe233fd05cab551b640a53f75b4f27aa555c31a5c2e6d399d15fe2ead3ca0ff93f0e

  • SSDEEP

    12288:lG39EAdG15pFpHHXcTK5zCbpFqnuQTcDNhBRSJFUKD2N3Ke5rxBNsugslx7YN09X:2eAo1PPHHpZCbp4eRlx/D0fe

Malware Config

Targets

    • Target

      03e6cdbb512d161e7ad32f8b43d25020_JaffaCakes118

    • Size

      969KB

    • MD5

      03e6cdbb512d161e7ad32f8b43d25020

    • SHA1

      9f12e33d55f42233227980c22d60d1c93da43446

    • SHA256

      0122ae0e4c94651c5787b9ce8317aa0b7f329e5b8b256097feecf9b3e21d03cc

    • SHA512

      7aa8a0e37e8621567af5959493ca09f6a05f93a1bfca5f34a5f383def9debe233fd05cab551b640a53f75b4f27aa555c31a5c2e6d399d15fe2ead3ca0ff93f0e

    • SSDEEP

      12288:lG39EAdG15pFpHHXcTK5zCbpFqnuQTcDNhBRSJFUKD2N3Ke5rxBNsugslx7YN09X:2eAo1PPHHpZCbp4eRlx/D0fe

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks