General

  • Target

    6716404f81bfc9e50f9d579d62b38ae1_JaffaCakes118

  • Size

    3.3MB

  • Sample

    240522-ng4dlacg93

  • MD5

    6716404f81bfc9e50f9d579d62b38ae1

  • SHA1

    b4fbaeb9b7199a2fe3a11688fc0f581a83d10726

  • SHA256

    d9f97fc57b493accaadefbb05f109f0702f448874a8c92402b340d9ea1685411

  • SHA512

    eb90eec9cffc6b5b3a6f3f3890f870861b4fdddc94a215a6fd763d5673dfa84e6c51527b12a6d64892dc342d715fad8d1f4b0f14ea3fcfa954a6eae69e9c1346

  • SSDEEP

    98304:fPrL/jD6ZNvBoknQqBDCirqDMaepvb3LHOtywXj3kYK1pGL:fDDSZNKkBQe5y

Malware Config

Targets

    • Target

      6716404f81bfc9e50f9d579d62b38ae1_JaffaCakes118

    • Size

      3.3MB

    • MD5

      6716404f81bfc9e50f9d579d62b38ae1

    • SHA1

      b4fbaeb9b7199a2fe3a11688fc0f581a83d10726

    • SHA256

      d9f97fc57b493accaadefbb05f109f0702f448874a8c92402b340d9ea1685411

    • SHA512

      eb90eec9cffc6b5b3a6f3f3890f870861b4fdddc94a215a6fd763d5673dfa84e6c51527b12a6d64892dc342d715fad8d1f4b0f14ea3fcfa954a6eae69e9c1346

    • SSDEEP

      98304:fPrL/jD6ZNvBoknQqBDCirqDMaepvb3LHOtywXj3kYK1pGL:fDDSZNKkBQe5y

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Matrix

Tasks