General

  • Target

    41f767ee5f84e0b0c3b0b0943ba4debf_JaffaCakes118

  • Size

    841KB

  • Sample

    241013-zfdbka1hpm

  • MD5

    41f767ee5f84e0b0c3b0b0943ba4debf

  • SHA1

    a625e142236dec98a53baaaaa4e48db1e890951f

  • SHA256

    79846c929fb3ebe6425fd83c06c4c0d9d43ead821d6da75e37472b99a185898e

  • SHA512

    9f1c0d00da27f5eb5fd6b9e1d12916d87f2e5642a526d8aeef0f35a55a956573a8bd9fbb4a43839a84858bef41a98bfd06b3e8df59e4b6d8a8ba8f9a767dbc58

  • SSDEEP

    12288:FTufHLI6xRbH7F/tRr1d2GWxZUZSOT1FUe4nOUV2R8/Iagn+qs1lHG0GJeK3UzVw:FTufHssAoTodNARZFtXLcX8jkqH/j

Malware Config

Targets

    • Target

      41f767ee5f84e0b0c3b0b0943ba4debf_JaffaCakes118

    • Size

      841KB

    • MD5

      41f767ee5f84e0b0c3b0b0943ba4debf

    • SHA1

      a625e142236dec98a53baaaaa4e48db1e890951f

    • SHA256

      79846c929fb3ebe6425fd83c06c4c0d9d43ead821d6da75e37472b99a185898e

    • SHA512

      9f1c0d00da27f5eb5fd6b9e1d12916d87f2e5642a526d8aeef0f35a55a956573a8bd9fbb4a43839a84858bef41a98bfd06b3e8df59e4b6d8a8ba8f9a767dbc58

    • SSDEEP

      12288:FTufHLI6xRbH7F/tRr1d2GWxZUZSOT1FUe4nOUV2R8/Iagn+qs1lHG0GJeK3UzVw:FTufHssAoTodNARZFtXLcX8jkqH/j

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Reads the content of the browser bookmarks.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks