General

  • Target

    c6d32a08a27ce448114bfc96fcdf832c_JaffaCakes118

  • Size

    6.2MB

  • Sample

    240405-bmeafaga2z

  • MD5

    c6d32a08a27ce448114bfc96fcdf832c

  • SHA1

    557ea327f350dcaa964febe2ecac5462b12ce5c2

  • SHA256

    f09c8ec97b11fd680f0e613ee7e80ff62277d15bdac386b4b5579f4174138826

  • SHA512

    cb138e164391edae7dbc98902a811c123a3c572e37cee9c240237e900331b0d9f58cce17c2d93ea39aa4f2fc5c60ad3697c1db88f31a5868b221404ddd8e4ae8

  • SSDEEP

    196608:6+fxbvsb2zYgZLV9lMTrY0Zo1CDFmh1J0Y51:6+fxTsSVZLhMI+mP31

Malware Config

Targets

    • Target

      c6d32a08a27ce448114bfc96fcdf832c_JaffaCakes118

    • Size

      6.2MB

    • MD5

      c6d32a08a27ce448114bfc96fcdf832c

    • SHA1

      557ea327f350dcaa964febe2ecac5462b12ce5c2

    • SHA256

      f09c8ec97b11fd680f0e613ee7e80ff62277d15bdac386b4b5579f4174138826

    • SHA512

      cb138e164391edae7dbc98902a811c123a3c572e37cee9c240237e900331b0d9f58cce17c2d93ea39aa4f2fc5c60ad3697c1db88f31a5868b221404ddd8e4ae8

    • SSDEEP

      196608:6+fxbvsb2zYgZLV9lMTrY0Zo1CDFmh1J0Y51:6+fxTsSVZLhMI+mP31

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks