General

  • Target

    02b0f768109a396a285367f83651da18_JaffaCakes118

  • Size

    9.6MB

  • Sample

    240427-hyt9cseb7z

  • MD5

    02b0f768109a396a285367f83651da18

  • SHA1

    d0312d5809aad1e621d8b0bde11c02f405d3aa4f

  • SHA256

    a66dac166f6f8f1db0234e17c58f8e6b804d32cb0c264a45380ae6891a82e6fd

  • SHA512

    cc4a0519003bfbc2abfbf9e285c2e2ab347b2e3e167d66bc8fb08d2b3d55619a7a20c4657c39faa747f7c8c9a91690541062e0a9fc7db078efb1b7776849e477

  • SSDEEP

    196608:8QAQ56dOEbI6S0ens0YGbo0V/Fn5D+gMJ2oPK1Z/xm7wgLji2SZ1MuDMsZ:8QAQ5uvbvTyYd0V/lsRzPK7/xmDHi2ST

Malware Config

Targets

    • Target

      02b0f768109a396a285367f83651da18_JaffaCakes118

    • Size

      9.6MB

    • MD5

      02b0f768109a396a285367f83651da18

    • SHA1

      d0312d5809aad1e621d8b0bde11c02f405d3aa4f

    • SHA256

      a66dac166f6f8f1db0234e17c58f8e6b804d32cb0c264a45380ae6891a82e6fd

    • SHA512

      cc4a0519003bfbc2abfbf9e285c2e2ab347b2e3e167d66bc8fb08d2b3d55619a7a20c4657c39faa747f7c8c9a91690541062e0a9fc7db078efb1b7776849e477

    • SSDEEP

      196608:8QAQ56dOEbI6S0ens0YGbo0V/Fn5D+gMJ2oPK1Z/xm7wgLji2SZ1MuDMsZ:8QAQ5uvbvTyYd0V/lsRzPK7/xmDHi2ST

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks