General

  • Target

    f5b2ceae8b0516d7439d33cdfca151b1_JaffaCakes118

  • Size

    263KB

  • Sample

    240417-nycl7sfc6t

  • MD5

    f5b2ceae8b0516d7439d33cdfca151b1

  • SHA1

    c484bf934b8a94ca6b0bff0df22e8bdad6b2209b

  • SHA256

    c57ac81c1849d110c18f98505b628918b8e0f8b5defcecda7e9334001c065398

  • SHA512

    663af1a4c3f8e0f3bbf9d33dfeda5b14ced9da5eb6af67e46b7dbddec4f4ed54ad0e63b64c15f6d956f135ca72dd17340114795726b168cf1b8b3fe11f823925

  • SSDEEP

    6144:/PNvivXSCeVvnD2IJOsBFaw4IzEsS/ZXBc2Y4MT5fNg:Vi6tQIwsBFa/IvcR9Ug

Malware Config

Targets

    • Target

      f5b2ceae8b0516d7439d33cdfca151b1_JaffaCakes118

    • Size

      263KB

    • MD5

      f5b2ceae8b0516d7439d33cdfca151b1

    • SHA1

      c484bf934b8a94ca6b0bff0df22e8bdad6b2209b

    • SHA256

      c57ac81c1849d110c18f98505b628918b8e0f8b5defcecda7e9334001c065398

    • SHA512

      663af1a4c3f8e0f3bbf9d33dfeda5b14ced9da5eb6af67e46b7dbddec4f4ed54ad0e63b64c15f6d956f135ca72dd17340114795726b168cf1b8b3fe11f823925

    • SSDEEP

      6144:/PNvivXSCeVvnD2IJOsBFaw4IzEsS/ZXBc2Y4MT5fNg:Vi6tQIwsBFa/IvcR9Ug

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Removes its main activity from the application launcher

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries account information for other applications stored on the device.

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks