General

  • Target

    9e74807e804e9ac8df0e5766c08bd137_JaffaCakes118

  • Size

    5.5MB

  • Sample

    241125-2593ya1nh1

  • MD5

    9e74807e804e9ac8df0e5766c08bd137

  • SHA1

    815037f05467a01cd9a4b4cb76a73ca5abfe9e60

  • SHA256

    3d5cb707d1f0a966d1726059739e17ba229ffde8739cbe98fca2496821906a5f

  • SHA512

    bc4247bb1f38e3d2e1d3ae366e97a50c5068c996d1bca3094b916f578b15beaf1f852e0b7772e2dc7bb36c14d7a2f97562304cdb097c9badaa367457d246e079

  • SSDEEP

    98304:/XkyjQbf3qJ7hZqtgxPItA97GBoPRQl1WVQb5jAVOoa/gphkvQKWcnKOxJdnL:vxkbfq7LTxPSBkQ95jgvh1itPB

Malware Config

Targets

    • Target

      9e74807e804e9ac8df0e5766c08bd137_JaffaCakes118

    • Size

      5.5MB

    • MD5

      9e74807e804e9ac8df0e5766c08bd137

    • SHA1

      815037f05467a01cd9a4b4cb76a73ca5abfe9e60

    • SHA256

      3d5cb707d1f0a966d1726059739e17ba229ffde8739cbe98fca2496821906a5f

    • SHA512

      bc4247bb1f38e3d2e1d3ae366e97a50c5068c996d1bca3094b916f578b15beaf1f852e0b7772e2dc7bb36c14d7a2f97562304cdb097c9badaa367457d246e079

    • SSDEEP

      98304:/XkyjQbf3qJ7hZqtgxPItA97GBoPRQl1WVQb5jAVOoa/gphkvQKWcnKOxJdnL:vxkbfq7LTxPSBkQ95jgvh1itPB

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks