General

  • Target

    670b7698a2152cc5a8a147496f204a7a_JaffaCakes118

  • Size

    6.7MB

  • Sample

    240522-m7azasce76

  • MD5

    670b7698a2152cc5a8a147496f204a7a

  • SHA1

    e6546290b7525703f6eca0a7da7f24b0408deba0

  • SHA256

    e21dab5f7d50298b27605fc99048e58514b81f8ebcea037c1ad9c387c4be6908

  • SHA512

    448fdc861c30e662db6c40d02e400413a42a072a5bcd8085f71cffa9edebf301a938d71a25e8629842a2072bf356e87d88e393b771d4f88eb5452f3c4a9f14b6

  • SSDEEP

    196608:ZjvR2BsUHQVGC77HUAg3LH8HRR6wDRPTr14fVZL:Zjp4oF77HWoHXpu

Malware Config

Targets

    • Target

      670b7698a2152cc5a8a147496f204a7a_JaffaCakes118

    • Size

      6.7MB

    • MD5

      670b7698a2152cc5a8a147496f204a7a

    • SHA1

      e6546290b7525703f6eca0a7da7f24b0408deba0

    • SHA256

      e21dab5f7d50298b27605fc99048e58514b81f8ebcea037c1ad9c387c4be6908

    • SHA512

      448fdc861c30e662db6c40d02e400413a42a072a5bcd8085f71cffa9edebf301a938d71a25e8629842a2072bf356e87d88e393b771d4f88eb5452f3c4a9f14b6

    • SSDEEP

      196608:ZjvR2BsUHQVGC77HUAg3LH8HRR6wDRPTr14fVZL:Zjp4oF77HWoHXpu

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks