General

  • Target

    347d8016a7a887939ea54e1e1ca13440_JaffaCakes118

  • Size

    30.5MB

  • Sample

    240511-n7xnqsfb3y

  • MD5

    347d8016a7a887939ea54e1e1ca13440

  • SHA1

    7d0409d63f739d4b7a0f609d7384e4d3311909a5

  • SHA256

    46a51db7bc9bfe13cf27f4e49bcad42b24d01c5d46091f3fe76ce3f799546751

  • SHA512

    a1bdf95f7cef527dee3109caa56f54e35e39889b3712c9eba02f23248032ee93bcd8367c86ed82a5007df2bdeb21c9efd2f203f107b01288e577d18dc3e6d3e1

  • SSDEEP

    786432:qUwN1zIC73uIMiEWIqypW1ZP5+tsEab8vG7oTc2kQDT/3T:010C73uHjWTP56sT4vG0Tc67

Malware Config

Targets

    • Target

      347d8016a7a887939ea54e1e1ca13440_JaffaCakes118

    • Size

      30.5MB

    • MD5

      347d8016a7a887939ea54e1e1ca13440

    • SHA1

      7d0409d63f739d4b7a0f609d7384e4d3311909a5

    • SHA256

      46a51db7bc9bfe13cf27f4e49bcad42b24d01c5d46091f3fe76ce3f799546751

    • SHA512

      a1bdf95f7cef527dee3109caa56f54e35e39889b3712c9eba02f23248032ee93bcd8367c86ed82a5007df2bdeb21c9efd2f203f107b01288e577d18dc3e6d3e1

    • SSDEEP

      786432:qUwN1zIC73uIMiEWIqypW1ZP5+tsEab8vG7oTc2kQDT/3T:010C73uHjWTP56sT4vG0Tc67

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Matrix

Tasks