General

  • Target

    67ead4181c09f74ac8fc37e0358ae4e8_JaffaCakes118

  • Size

    11.5MB

  • Sample

    240522-t7jprshd9y

  • MD5

    67ead4181c09f74ac8fc37e0358ae4e8

  • SHA1

    268492864fca8bc2905c243427e178a3ab91a7bb

  • SHA256

    afe9befcd649f627198a4ae953334d794fcaa2d206fac35b457f90354a56655f

  • SHA512

    25511e652b3c9cd4b08f6edfbbcc614f5a200e6ef67639d3db1dcd10b884d1005e4059839706039c4b913cfc1d7547d5c4fbfda5d65e2485c8900a7e802b2484

  • SSDEEP

    196608:XniELeHD/rQHSYXAmkI9rqSJLSYEtdszh5u8CyMHb9bqAovWL3p29/AL3p29/8C4:XniE4/rQHfX/DxGtWzsyMHJbq5vWL30I

Malware Config

Targets

    • Target

      67ead4181c09f74ac8fc37e0358ae4e8_JaffaCakes118

    • Size

      11.5MB

    • MD5

      67ead4181c09f74ac8fc37e0358ae4e8

    • SHA1

      268492864fca8bc2905c243427e178a3ab91a7bb

    • SHA256

      afe9befcd649f627198a4ae953334d794fcaa2d206fac35b457f90354a56655f

    • SHA512

      25511e652b3c9cd4b08f6edfbbcc614f5a200e6ef67639d3db1dcd10b884d1005e4059839706039c4b913cfc1d7547d5c4fbfda5d65e2485c8900a7e802b2484

    • SSDEEP

      196608:XniELeHD/rQHSYXAmkI9rqSJLSYEtdszh5u8CyMHb9bqAovWL3p29/AL3p29/8C4:XniE4/rQHfX/DxGtWzsyMHJbq5vWL30I

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks