General

  • Target

    66d9f034655d92baf68a3e53c0eff4e0_JaffaCakes118

  • Size

    31.7MB

  • Sample

    240522-lvelaabb8t

  • MD5

    66d9f034655d92baf68a3e53c0eff4e0

  • SHA1

    04c2b8d8eecfc14da1901026afd726bd95218f59

  • SHA256

    6e67788d197b170ecbe3b83fb79e49c1e53b9d9643f3cd1e22d9f580621f79c6

  • SHA512

    1c154c41914ffc7a8e5ea7fd7a3fff1b1648a9fad1b8bc678f733f09d5ab38b82e44e8cf5762fd0ca8e688d5bc4183214c2343fd5bef1c69719cbf5e788b15f8

  • SSDEEP

    786432:zEUk0Z53pr71TAz9M0gvUNA6jkTz35ielG+OfTZPPo:zNk0T3e9Ba6gP5XlGzfTBo

Malware Config

Targets

    • Target

      66d9f034655d92baf68a3e53c0eff4e0_JaffaCakes118

    • Size

      31.7MB

    • MD5

      66d9f034655d92baf68a3e53c0eff4e0

    • SHA1

      04c2b8d8eecfc14da1901026afd726bd95218f59

    • SHA256

      6e67788d197b170ecbe3b83fb79e49c1e53b9d9643f3cd1e22d9f580621f79c6

    • SHA512

      1c154c41914ffc7a8e5ea7fd7a3fff1b1648a9fad1b8bc678f733f09d5ab38b82e44e8cf5762fd0ca8e688d5bc4183214c2343fd5bef1c69719cbf5e788b15f8

    • SSDEEP

      786432:zEUk0Z53pr71TAz9M0gvUNA6jkTz35ielG+OfTZPPo:zNk0T3e9Ba6gP5XlGzfTBo

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks