General

  • Target

    ea3a33cdd084eea796816fbf477f533f_JaffaCakes118

  • Size

    1.4MB

  • Sample

    241213-gqyfdasjhq

  • MD5

    ea3a33cdd084eea796816fbf477f533f

  • SHA1

    08bc369c7de4ea4732226797bba80fb1b5842e2c

  • SHA256

    704b3669bf3eb8c365702cddb66d9c10688f1d8115f98dc0e5d16396c33b6b6c

  • SHA512

    37382465e1273421781065d4d7bb075a91d98cd962eb2e426fb2907eeebe93659c813e8bb6b8dc1443ebc298be8b2fec10ace572daf2556308c1dad4da4b01e3

  • SSDEEP

    24576:/awgIRKrKr9F+tjq/qKld+EMphtlFZOPt6VcayYGJUTuTqCUsQQDO5SNxqZ:/awhQp9q/jldPMphtlFY16VikooQC5Sc

Malware Config

Targets

    • Target

      ea3a33cdd084eea796816fbf477f533f_JaffaCakes118

    • Size

      1.4MB

    • MD5

      ea3a33cdd084eea796816fbf477f533f

    • SHA1

      08bc369c7de4ea4732226797bba80fb1b5842e2c

    • SHA256

      704b3669bf3eb8c365702cddb66d9c10688f1d8115f98dc0e5d16396c33b6b6c

    • SHA512

      37382465e1273421781065d4d7bb075a91d98cd962eb2e426fb2907eeebe93659c813e8bb6b8dc1443ebc298be8b2fec10ace572daf2556308c1dad4da4b01e3

    • SSDEEP

      24576:/awgIRKrKr9F+tjq/qKld+EMphtlFZOPt6VcayYGJUTuTqCUsQQDO5SNxqZ:/awhQp9q/jldPMphtlFY16VikooQC5Sc

    • Checks Android system properties for emulator presence.

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of SMS inbox messages.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks