General

  • Target

    0c557327d6746a731febecd2e4e27815_JaffaCakes118

  • Size

    3.4MB

  • Sample

    240501-vgsenabf7v

  • MD5

    0c557327d6746a731febecd2e4e27815

  • SHA1

    41fc3429ca8c39ec7374137e724a5970e29a8544

  • SHA256

    ebc1a8cc8f4435bce6cfd25cd4e5ecdf44fda321431dac2849ef6d2d8792f804

  • SHA512

    15a3901e3271fc7a47ce28922aceffd4eae5f0f3290ffa370cf4e0eb3f51538958daf04735601213c817b321be5532a6f189f1f5b8853f752103a7b5524e1e8e

  • SSDEEP

    98304:DdwyoQFnvKx7tNT/5r6SxBh3t2zrHGL9QBGYtjtEYs:2vQNKf95r6Sri09Qw1

Malware Config

Targets

    • Target

      0c557327d6746a731febecd2e4e27815_JaffaCakes118

    • Size

      3.4MB

    • MD5

      0c557327d6746a731febecd2e4e27815

    • SHA1

      41fc3429ca8c39ec7374137e724a5970e29a8544

    • SHA256

      ebc1a8cc8f4435bce6cfd25cd4e5ecdf44fda321431dac2849ef6d2d8792f804

    • SHA512

      15a3901e3271fc7a47ce28922aceffd4eae5f0f3290ffa370cf4e0eb3f51538958daf04735601213c817b321be5532a6f189f1f5b8853f752103a7b5524e1e8e

    • SSDEEP

      98304:DdwyoQFnvKx7tNT/5r6SxBh3t2zrHGL9QBGYtjtEYs:2vQNKf95r6Sri09Qw1

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks