General

  • Target

    85a241e9b28d7c602503a9276f413662_JaffaCakes118

  • Size

    687KB

  • Sample

    241102-qjwgwavkhx

  • MD5

    85a241e9b28d7c602503a9276f413662

  • SHA1

    efc2064ac32d963e326ff0641ddacb58fab72f1a

  • SHA256

    96f6f725178d648dd98d16d7e9095457b42bfe7b15419c0e470dc312b697890d

  • SHA512

    55c3ecc637cb2f5ad29d2d07b06262b63e7341dbd150d1232a903501ea319ddb59492e5ab45b283c80deef98eefbe51e616ffc19e5cfe35c41baeff1474acd5e

  • SSDEEP

    12288:t3AxEHw9xbIW0T+NZQMjQzdQ2bqX3i7Q5CvvkclrtssdU:t3uE35T+QMjQzdAXElrtHdU

Malware Config

Targets

    • Target

      85a241e9b28d7c602503a9276f413662_JaffaCakes118

    • Size

      687KB

    • MD5

      85a241e9b28d7c602503a9276f413662

    • SHA1

      efc2064ac32d963e326ff0641ddacb58fab72f1a

    • SHA256

      96f6f725178d648dd98d16d7e9095457b42bfe7b15419c0e470dc312b697890d

    • SHA512

      55c3ecc637cb2f5ad29d2d07b06262b63e7341dbd150d1232a903501ea319ddb59492e5ab45b283c80deef98eefbe51e616ffc19e5cfe35c41baeff1474acd5e

    • SSDEEP

      12288:t3AxEHw9xbIW0T+NZQMjQzdQ2bqX3i7Q5CvvkclrtssdU:t3uE35T+QMjQzdAXElrtHdU

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Reads the contacts stored on the device.

    • Reads the content of SMS inbox messages.

    • Acquires the wake lock

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks