General

  • Target

    fbc745b351331255d695062a1a12af30_JaffaCakes118

  • Size

    28.6MB

  • Sample

    240420-dgnyssfe7t

  • MD5

    fbc745b351331255d695062a1a12af30

  • SHA1

    cae3ba915c9000b758b92224fb63df21ec9d5d91

  • SHA256

    f00792d8d741bfea74774c79b61f80e0eb8703afc16247d01db38b2a6a69ecfc

  • SHA512

    3f797e46c3e4b5713e6b458016dd4f700b826fd574fa840205ebaa168bfc9e671550d9ec70b05a007d25e02b9692c9eaf03a40bbf902e1f15e6b080d4913e077

  • SSDEEP

    786432:k+/TKVoQYIej/8R94qVP04YvkFeEDs9ZojYC6Rinqk87NSVIfZR4I:ksG4I4/M94aovkFrIZo4iX8EVQd

Malware Config

Targets

    • Target

      fbc745b351331255d695062a1a12af30_JaffaCakes118

    • Size

      28.6MB

    • MD5

      fbc745b351331255d695062a1a12af30

    • SHA1

      cae3ba915c9000b758b92224fb63df21ec9d5d91

    • SHA256

      f00792d8d741bfea74774c79b61f80e0eb8703afc16247d01db38b2a6a69ecfc

    • SHA512

      3f797e46c3e4b5713e6b458016dd4f700b826fd574fa840205ebaa168bfc9e671550d9ec70b05a007d25e02b9692c9eaf03a40bbf902e1f15e6b080d4913e077

    • SSDEEP

      786432:k+/TKVoQYIej/8R94qVP04YvkFeEDs9ZojYC6Rinqk87NSVIfZR4I:ksG4I4/M94aovkFrIZo4iX8EVQd

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks