General

  • Target

    527473de054d2338803b9e138cd89d5b_JaffaCakes118

  • Size

    1.6MB

  • Sample

    241017-sgsdjsvhnm

  • MD5

    527473de054d2338803b9e138cd89d5b

  • SHA1

    c6780c7d1398857548a53e4ebae90ceee88baaf3

  • SHA256

    fa81a8e0e91b5a4b75107ddfb093763d5f0fa8d44beeecaf6db65eddb05ec37d

  • SHA512

    b53d9b182a78a9e59a725fcbd686b4966364f8a3791abeb105b211d4596bdca6db2766e58b5134beab3012ffeec75e58567748976b2e84d1a7c7becb009cf474

  • SSDEEP

    49152:IrNo3jmRq2ccrf62YBRouK/dTIFbylgc8FyN4:IruzX2Lf62YDoF/dTIFbjtQm

Malware Config

Targets

    • Target

      527473de054d2338803b9e138cd89d5b_JaffaCakes118

    • Size

      1.6MB

    • MD5

      527473de054d2338803b9e138cd89d5b

    • SHA1

      c6780c7d1398857548a53e4ebae90ceee88baaf3

    • SHA256

      fa81a8e0e91b5a4b75107ddfb093763d5f0fa8d44beeecaf6db65eddb05ec37d

    • SHA512

      b53d9b182a78a9e59a725fcbd686b4966364f8a3791abeb105b211d4596bdca6db2766e58b5134beab3012ffeec75e58567748976b2e84d1a7c7becb009cf474

    • SSDEEP

      49152:IrNo3jmRq2ccrf62YBRouK/dTIFbylgc8FyN4:IruzX2Lf62YDoF/dTIFbjtQm

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks