General

  • Target

    63f5b3e70623fa11bc82e3d71523ba85_JaffaCakes118

  • Size

    328KB

  • Sample

    240521-typ57abg8w

  • MD5

    63f5b3e70623fa11bc82e3d71523ba85

  • SHA1

    db1a0a7662a91fe409cc006c8a86c89fc8275b27

  • SHA256

    d9648402587e722419ad9ed8f113e6706e7ceda56a2994121e3c2f2c6fd192e9

  • SHA512

    cc09bda79e842cf4887cfa15957bf0db8ed5ac2c1960c932ab1fd5fb9012334b43e0eda6ddf39753cd30fd0db0fb8531b842dbafeee0716d24bdd33958cfc97f

  • SSDEEP

    6144:2e3wxpMexgY+jarjdLMCW1zjU/buPXsFwsDDGcZtVjcs+7xs:2PxpV++hNUMSPZQqcftky

Malware Config

Targets

    • Target

      63f5b3e70623fa11bc82e3d71523ba85_JaffaCakes118

    • Size

      328KB

    • MD5

      63f5b3e70623fa11bc82e3d71523ba85

    • SHA1

      db1a0a7662a91fe409cc006c8a86c89fc8275b27

    • SHA256

      d9648402587e722419ad9ed8f113e6706e7ceda56a2994121e3c2f2c6fd192e9

    • SHA512

      cc09bda79e842cf4887cfa15957bf0db8ed5ac2c1960c932ab1fd5fb9012334b43e0eda6ddf39753cd30fd0db0fb8531b842dbafeee0716d24bdd33958cfc97f

    • SSDEEP

      6144:2e3wxpMexgY+jarjdLMCW1zjU/buPXsFwsDDGcZtVjcs+7xs:2PxpV++hNUMSPZQqcftky

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks