General

  • Target

    09b0b89f5afba38a52f627894e1caa5c_JaffaCakes118

  • Size

    479KB

  • Sample

    241002-jzvryswalq

  • MD5

    09b0b89f5afba38a52f627894e1caa5c

  • SHA1

    ac03bb8b067bc4a2f369217fa2094e3ca7e99d8d

  • SHA256

    d71d7680ad9e75f3f65e52ae47ce9f646eb77108f5dca5b5ecb9281be07f18f8

  • SHA512

    bf2d17dcb61faab33e4f8e1b638a5796b4289391acef1a7c207839f227d50aacf011d1095f6dceab32b1e7620f5f85a898266470240823d9a0cb73c1c918dae7

  • SSDEEP

    12288:QsDX4Sg7aRM9tcRRZZ5c09xP7ufmh607YjCGOJDXzsYAqsu:V4SkaRqcjDy09FYApNGRu

Malware Config

Targets

    • Target

      09b0b89f5afba38a52f627894e1caa5c_JaffaCakes118

    • Size

      479KB

    • MD5

      09b0b89f5afba38a52f627894e1caa5c

    • SHA1

      ac03bb8b067bc4a2f369217fa2094e3ca7e99d8d

    • SHA256

      d71d7680ad9e75f3f65e52ae47ce9f646eb77108f5dca5b5ecb9281be07f18f8

    • SHA512

      bf2d17dcb61faab33e4f8e1b638a5796b4289391acef1a7c207839f227d50aacf011d1095f6dceab32b1e7620f5f85a898266470240823d9a0cb73c1c918dae7

    • SSDEEP

      12288:QsDX4Sg7aRM9tcRRZZ5c09xP7ufmh607YjCGOJDXzsYAqsu:V4SkaRqcjDy09FYApNGRu

    • Removes its main activity from the application launcher

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks