General

  • Target

    6326765f46d7ed1a875d0cf47a959749_JaffaCakes118

  • Size

    6.8MB

  • Sample

    240521-nqnz9scb6v

  • MD5

    6326765f46d7ed1a875d0cf47a959749

  • SHA1

    189bde520086d6619b1d0166587095ceed886e3a

  • SHA256

    a2fc2738e91a3b30e63e79074f65b485a88f7cf7c60361726360adba28d760ba

  • SHA512

    c25c664488087ef6dc0bbd232618c4ed201b25292e48a7e57b9e80507a16d01e8514b2c5b8c2abc3ff49b8dccaabc7643d936b3c1b2f45e78678147a60696349

  • SSDEEP

    196608:eI1BSmTTjwcx8j9yASKszdcq4r9llJzk6alyJjVswlXSo:R1BS4Tjwv9yASKszdcqC9llpkiPr1

Malware Config

Targets

    • Target

      6326765f46d7ed1a875d0cf47a959749_JaffaCakes118

    • Size

      6.8MB

    • MD5

      6326765f46d7ed1a875d0cf47a959749

    • SHA1

      189bde520086d6619b1d0166587095ceed886e3a

    • SHA256

      a2fc2738e91a3b30e63e79074f65b485a88f7cf7c60361726360adba28d760ba

    • SHA512

      c25c664488087ef6dc0bbd232618c4ed201b25292e48a7e57b9e80507a16d01e8514b2c5b8c2abc3ff49b8dccaabc7643d936b3c1b2f45e78678147a60696349

    • SSDEEP

      196608:eI1BSmTTjwcx8j9yASKszdcq4r9llJzk6alyJjVswlXSo:R1BS4Tjwv9yASKszdcqC9llpkiPr1

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks