General

  • Target

    03bec9974278ea18202d597b9f2e5b79_JaffaCakes118

  • Size

    6.9MB

  • Sample

    240427-15zrjahf77

  • MD5

    03bec9974278ea18202d597b9f2e5b79

  • SHA1

    3f011bd908212aedee0af319c5675c2335be0e6d

  • SHA256

    7e5ea9a965f763f9274bb93aa5428bf9b81de0a5a479a7262253925c095b63e2

  • SHA512

    ed0c18d9826c6d10db7720d1a48e1edffbe6da25abc8f4fde92f95128948f049e100404c8aa0b11d19601da9c72509a005d8189e830123ecb220e3679f11c47f

  • SSDEEP

    98304:gwIUadB/z8fOwtgOzLwDM5b7RqYXJcbXPQ+QohND5nU0lOPY3jKNKD6O+NNyALLO:oUadWWqAQl7AasQR8nB8zO+vLO

Malware Config

Targets

    • Target

      03bec9974278ea18202d597b9f2e5b79_JaffaCakes118

    • Size

      6.9MB

    • MD5

      03bec9974278ea18202d597b9f2e5b79

    • SHA1

      3f011bd908212aedee0af319c5675c2335be0e6d

    • SHA256

      7e5ea9a965f763f9274bb93aa5428bf9b81de0a5a479a7262253925c095b63e2

    • SHA512

      ed0c18d9826c6d10db7720d1a48e1edffbe6da25abc8f4fde92f95128948f049e100404c8aa0b11d19601da9c72509a005d8189e830123ecb220e3679f11c47f

    • SSDEEP

      98304:gwIUadB/z8fOwtgOzLwDM5b7RqYXJcbXPQ+QohND5nU0lOPY3jKNKD6O+NNyALLO:oUadWWqAQl7AasQR8nB8zO+vLO

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Matrix

Tasks