General

  • Target

    5002fb5f1daff7468f480004fb81c4d6_JaffaCakes118

  • Size

    1.3MB

  • Sample

    241017-bdqbcaxann

  • MD5

    5002fb5f1daff7468f480004fb81c4d6

  • SHA1

    a783a51d6b5a8e46a1dcf4ada014443754d61f06

  • SHA256

    f02f9b3a9abd8913886f6632e9a2342cca30003b3a6e66d9463f728cf77018e3

  • SHA512

    abc2d4c05d353c2a30b3b859000e1bca52d66932bba9f14bf1b078a6baf4d33a7315a91c83804f6cb9ce161d9c30010aeeb113b2651cf372762e0bd0b0cb20ba

  • SSDEEP

    24576:tzMCZwn/LWnzfUZ7c8WLxIaWCJRYTaymovinFlKgKi1LcleUV9:eCSnzWnz8Kx5WE+aHrFogKiNclee

Malware Config

Targets

    • Target

      5002fb5f1daff7468f480004fb81c4d6_JaffaCakes118

    • Size

      1.3MB

    • MD5

      5002fb5f1daff7468f480004fb81c4d6

    • SHA1

      a783a51d6b5a8e46a1dcf4ada014443754d61f06

    • SHA256

      f02f9b3a9abd8913886f6632e9a2342cca30003b3a6e66d9463f728cf77018e3

    • SHA512

      abc2d4c05d353c2a30b3b859000e1bca52d66932bba9f14bf1b078a6baf4d33a7315a91c83804f6cb9ce161d9c30010aeeb113b2651cf372762e0bd0b0cb20ba

    • SSDEEP

      24576:tzMCZwn/LWnzfUZ7c8WLxIaWCJRYTaymovinFlKgKi1LcleUV9:eCSnzWnz8Kx5WE+aHrFogKiNclee

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks