General

  • Target

    4a17099c1e6923ddf6a695a87bb726fe_JaffaCakes118

  • Size

    6.7MB

  • Sample

    241015-1bjhfsxhnb

  • MD5

    4a17099c1e6923ddf6a695a87bb726fe

  • SHA1

    49f9d239dd2d4dbc23b239d9937b8eeb5dc215b7

  • SHA256

    cdcbb4a32e0b2d9e5d5d245a5e7c0c09c0fac9dafca27bd871018a16eff58982

  • SHA512

    d72e40c0fc42fbdd47afde0310ad6aaa0c9ca431a9901cdf04d43301c6bb28ec26e83e678b4b06ff572032f79ba4faff3b253ecf4256e1ae85e5029e258506ed

  • SSDEEP

    196608:3WeGQxjmQyLO3F3/i98FGdou0CpBovDGRdgboNMitQS:3Werk7gVi2B2KS

Malware Config

Targets

    • Target

      4a17099c1e6923ddf6a695a87bb726fe_JaffaCakes118

    • Size

      6.7MB

    • MD5

      4a17099c1e6923ddf6a695a87bb726fe

    • SHA1

      49f9d239dd2d4dbc23b239d9937b8eeb5dc215b7

    • SHA256

      cdcbb4a32e0b2d9e5d5d245a5e7c0c09c0fac9dafca27bd871018a16eff58982

    • SHA512

      d72e40c0fc42fbdd47afde0310ad6aaa0c9ca431a9901cdf04d43301c6bb28ec26e83e678b4b06ff572032f79ba4faff3b253ecf4256e1ae85e5029e258506ed

    • SSDEEP

      196608:3WeGQxjmQyLO3F3/i98FGdou0CpBovDGRdgboNMitQS:3Werk7gVi2B2KS

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks