General

  • Target

    3c380c5680781a6fd70609f5f7f514d4_JaffaCakes118

  • Size

    7.0MB

  • Sample

    240513-w7mgrsha9y

  • MD5

    3c380c5680781a6fd70609f5f7f514d4

  • SHA1

    9b64a42c15825ff1683c06d4d584ac0fb050fadd

  • SHA256

    56d7666c12f687b81b04d88ad8b9e62dc49d4be3e12e520f847f38828cb0ae5a

  • SHA512

    80d25fcc18815e55889d2f93f80761e1fa48fdff6778c56a4bfe2261ec53c24ef43e0c77830f7cbab83245071df21f60ebe1616e0c6da6450173c54f5b15c612

  • SSDEEP

    196608:IR0HVLZ6iNpEmXk06EcRc0PvyvMBIuEIVkV:WCVAavXYEcR7v8M+aVK

Malware Config

Targets

    • Target

      3c380c5680781a6fd70609f5f7f514d4_JaffaCakes118

    • Size

      7.0MB

    • MD5

      3c380c5680781a6fd70609f5f7f514d4

    • SHA1

      9b64a42c15825ff1683c06d4d584ac0fb050fadd

    • SHA256

      56d7666c12f687b81b04d88ad8b9e62dc49d4be3e12e520f847f38828cb0ae5a

    • SHA512

      80d25fcc18815e55889d2f93f80761e1fa48fdff6778c56a4bfe2261ec53c24ef43e0c77830f7cbab83245071df21f60ebe1616e0c6da6450173c54f5b15c612

    • SSDEEP

      196608:IR0HVLZ6iNpEmXk06EcRc0PvyvMBIuEIVkV:WCVAavXYEcR7v8M+aVK

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks