General

  • Target

    861a98106a2e33713e723e3b5d3374bf_JaffaCakes118

  • Size

    5.7MB

  • Sample

    241102-skza9sxkfx

  • MD5

    861a98106a2e33713e723e3b5d3374bf

  • SHA1

    5a05e376669a806f2f47a1b4366a8ebf07adc876

  • SHA256

    833c4c159d221a40606a689404bcdff2c4cc56bcb010dd67ba632de88427a9bb

  • SHA512

    23baabe9fbbfc26a2edd32fb8cac34b07fe9bcfd0c825d3f05bb1ee003e93931cd0f74b34031a0dabf16761a9b7cf2dc34f018912f20fb6f6aafcfd01c1d760e

  • SSDEEP

    98304:JdDcxePQWgFIXW0jLTWrnIxf8lWVRyttWWAb4CJj7u4w2Tk1s4NdiAXC:/6bW2yPLycxf88at/0zJnuV2E9fXC

Malware Config

Targets

    • Target

      861a98106a2e33713e723e3b5d3374bf_JaffaCakes118

    • Size

      5.7MB

    • MD5

      861a98106a2e33713e723e3b5d3374bf

    • SHA1

      5a05e376669a806f2f47a1b4366a8ebf07adc876

    • SHA256

      833c4c159d221a40606a689404bcdff2c4cc56bcb010dd67ba632de88427a9bb

    • SHA512

      23baabe9fbbfc26a2edd32fb8cac34b07fe9bcfd0c825d3f05bb1ee003e93931cd0f74b34031a0dabf16761a9b7cf2dc34f018912f20fb6f6aafcfd01c1d760e

    • SSDEEP

      98304:JdDcxePQWgFIXW0jLTWrnIxf8lWVRyttWWAb4CJj7u4w2Tk1s4NdiAXC:/6bW2yPLycxf88at/0zJnuV2E9fXC

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks