General

  • Target

    6f4d8157fb174df8b81229e131ecebf1_JaffaCakes118

  • Size

    2.0MB

  • Sample

    241023-rdsz8stepc

  • MD5

    6f4d8157fb174df8b81229e131ecebf1

  • SHA1

    b707b97186b4fb040c68d75de7c82247c87337c2

  • SHA256

    51972ea2fb1701695f3b473457b8f2cd0f265316c3777596717e1d42f83a2420

  • SHA512

    709aaa9475ac0205473835e7aaf987fec983bfbc606d979b4b8670c1d9749fb9c57ed4d34dd17ee623e20077d93a33870021cfdd0f7f7bfa9d13ef495e87cd97

  • SSDEEP

    24576:LF/5MyQhobruQfnAr9PFiEok+2zD76SoubVdfPNOit3qHbevoeH+bY6qlko4k3Mj:ZIouIAxvP7qufIwqHbevoeTz3i+geJ6L

Malware Config

Targets

    • Target

      6f4d8157fb174df8b81229e131ecebf1_JaffaCakes118

    • Size

      2.0MB

    • MD5

      6f4d8157fb174df8b81229e131ecebf1

    • SHA1

      b707b97186b4fb040c68d75de7c82247c87337c2

    • SHA256

      51972ea2fb1701695f3b473457b8f2cd0f265316c3777596717e1d42f83a2420

    • SHA512

      709aaa9475ac0205473835e7aaf987fec983bfbc606d979b4b8670c1d9749fb9c57ed4d34dd17ee623e20077d93a33870021cfdd0f7f7bfa9d13ef495e87cd97

    • SSDEEP

      24576:LF/5MyQhobruQfnAr9PFiEok+2zD76SoubVdfPNOit3qHbevoeH+bY6qlko4k3Mj:ZIouIAxvP7qufIwqHbevoeTz3i+geJ6L

    • Removes its main activity from the application launcher

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks