General

  • Target

    345b2d355fba9d16114c823e71b61ff8_JaffaCakes118

  • Size

    5.9MB

  • Sample

    240511-nkcp2sha44

  • MD5

    345b2d355fba9d16114c823e71b61ff8

  • SHA1

    6654c3e0a5e79144801e688afe04a37f283ec8cd

  • SHA256

    9d1f13408554f3a089d8f06ed771aeff801ad0477fda01b20ddb54c70412b8eb

  • SHA512

    4da86068d13f0ca5833c5ce2b04fbf2e209e523b80c2236e33c7bd2338726bf7343be435110c2b08b562ff0eebff962793cc44b37538290f0b83c3c2191bd257

  • SSDEEP

    98304:OemGwKfKK+7BNygvtLMsTOf4uXJvUfjetu3vnLC6IsabUn1Arfaur1Y6dsm+2dLL:rbfodNyAmsTOZX14jes3fLjV/gZm621W

Malware Config

Targets

    • Target

      345b2d355fba9d16114c823e71b61ff8_JaffaCakes118

    • Size

      5.9MB

    • MD5

      345b2d355fba9d16114c823e71b61ff8

    • SHA1

      6654c3e0a5e79144801e688afe04a37f283ec8cd

    • SHA256

      9d1f13408554f3a089d8f06ed771aeff801ad0477fda01b20ddb54c70412b8eb

    • SHA512

      4da86068d13f0ca5833c5ce2b04fbf2e209e523b80c2236e33c7bd2338726bf7343be435110c2b08b562ff0eebff962793cc44b37538290f0b83c3c2191bd257

    • SSDEEP

      98304:OemGwKfKK+7BNygvtLMsTOf4uXJvUfjetu3vnLC6IsabUn1Arfaur1Y6dsm+2dLL:rbfodNyAmsTOZX14jes3fLjV/gZm621W

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Matrix

Tasks