General

  • Target

    88ba2d169daa393f0b0674e79129f3ca_JaffaCakes118

  • Size

    495KB

  • Sample

    241103-aygdhazdna

  • MD5

    88ba2d169daa393f0b0674e79129f3ca

  • SHA1

    5b9763a5c53cd1ff2da65adf81f0e65d51f77ce0

  • SHA256

    e5c6462fb4c015dbc44c9213b208dfe8b4b0e7936c3ce0c40a1eb761f3f69fc8

  • SHA512

    c66aa479a8890c06b0819a95a948c4c1693d91eebc2fbe7da36c52beaa6c1c2234c28bb77f9b1347f408e6c887c17d36351fd6f7455c4478b7ca2151d757da24

  • SSDEEP

    12288:e82bcjXlNn1p7pHkb3NjqzXAdAiYe68CWs2W/:ecn3tHoZqzwdfXev/

Malware Config

Targets

    • Target

      88ba2d169daa393f0b0674e79129f3ca_JaffaCakes118

    • Size

      495KB

    • MD5

      88ba2d169daa393f0b0674e79129f3ca

    • SHA1

      5b9763a5c53cd1ff2da65adf81f0e65d51f77ce0

    • SHA256

      e5c6462fb4c015dbc44c9213b208dfe8b4b0e7936c3ce0c40a1eb761f3f69fc8

    • SHA512

      c66aa479a8890c06b0819a95a948c4c1693d91eebc2fbe7da36c52beaa6c1c2234c28bb77f9b1347f408e6c887c17d36351fd6f7455c4478b7ca2151d757da24

    • SSDEEP

      12288:e82bcjXlNn1p7pHkb3NjqzXAdAiYe68CWs2W/:ecn3tHoZqzwdfXev/

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks