General

  • Target

    f1b903f9274357a8430c3e7e7a6f0fed_JaffaCakes118

  • Size

    1.9MB

  • Sample

    240415-xxdbsadg89

  • MD5

    f1b903f9274357a8430c3e7e7a6f0fed

  • SHA1

    daf3e906a1e7149eec742c6cfb5fbc60468a6364

  • SHA256

    a757979045549feb337e93c2def69720c9b6b42350939979ed4e5c7252318a2f

  • SHA512

    53c661e66f28a797fc166caa67d5d59bda705cb85ffcf828211293e1d32cadc927b0ca83fb8cc40e572af116cc253a5cd0763764b74be2a9007d12a0c19f2b13

  • SSDEEP

    24576:q6Gh+ejL/tstnFJSi3LJb14h9h8OvWOmTAEdlnRsy7aPePkvNaWB7egIBHGrUqY:q68hLGnF1LN14h97ILllAvvN4Hp

Malware Config

Targets

    • Target

      f1b903f9274357a8430c3e7e7a6f0fed_JaffaCakes118

    • Size

      1.9MB

    • MD5

      f1b903f9274357a8430c3e7e7a6f0fed

    • SHA1

      daf3e906a1e7149eec742c6cfb5fbc60468a6364

    • SHA256

      a757979045549feb337e93c2def69720c9b6b42350939979ed4e5c7252318a2f

    • SHA512

      53c661e66f28a797fc166caa67d5d59bda705cb85ffcf828211293e1d32cadc927b0ca83fb8cc40e572af116cc253a5cd0763764b74be2a9007d12a0c19f2b13

    • SSDEEP

      24576:q6Gh+ejL/tstnFJSi3LJb14h9h8OvWOmTAEdlnRsy7aPePkvNaWB7egIBHGrUqY:q68hLGnF1LN14h97ILllAvvN4Hp

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about the current Wi-Fi connection.

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Tries to add a device administrator.

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Matrix

Tasks