General

  • Target

    0ffd4124786d4eef3eb4611b217d19a8_JaffaCakes118

  • Size

    29.2MB

  • Sample

    240503-jc424saa4x

  • MD5

    0ffd4124786d4eef3eb4611b217d19a8

  • SHA1

    a7af2714c43fa52a3634cfcd8b120d3e9567110e

  • SHA256

    d4a068fb20501d18a5d55c7ce5aee30e4130e380cba8c9fc0e969d701f46bcbb

  • SHA512

    b883b1dd9adb4e1ca84c9a0cf6c81c167f9d290ee7047d155afaf1306a7d0482f53d6c1c183d578f234f70cc35eed44e6079ae2327c58ce285a7cb7ec32833dd

  • SSDEEP

    786432:96Q07tmga9twC3Ct//up/WUt3FkmM+oe2n:96Q6totwC3Ct//+/9rkmMBn

Malware Config

Targets

    • Target

      0ffd4124786d4eef3eb4611b217d19a8_JaffaCakes118

    • Size

      29.2MB

    • MD5

      0ffd4124786d4eef3eb4611b217d19a8

    • SHA1

      a7af2714c43fa52a3634cfcd8b120d3e9567110e

    • SHA256

      d4a068fb20501d18a5d55c7ce5aee30e4130e380cba8c9fc0e969d701f46bcbb

    • SHA512

      b883b1dd9adb4e1ca84c9a0cf6c81c167f9d290ee7047d155afaf1306a7d0482f53d6c1c183d578f234f70cc35eed44e6079ae2327c58ce285a7cb7ec32833dd

    • SSDEEP

      786432:96Q07tmga9twC3Ct//up/WUt3FkmM+oe2n:96Q6totwC3Ct//+/9rkmMBn

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Matrix

Tasks