General

  • Target

    6855375e420163d98f37b072226a4702_JaffaCakes118

  • Size

    12.0MB

  • Sample

    240522-x1tsyadd5w

  • MD5

    6855375e420163d98f37b072226a4702

  • SHA1

    10a02c5f2333568ee46b1e82be426e567c5dff54

  • SHA256

    8bcc0ecd8b289cb8461fb063e77833677f74a85a359dc6f956184de6cfd17232

  • SHA512

    22b2780127615013dc7e4f5b343f7b7fe1acc4a9655085b31d96fbd5e7c1f17c2f31262af14ca4607f58e10fac23989c3d62b2dbf3206c9a6b4edc58357ea71c

  • SSDEEP

    196608:BwqR/KjnEW0PO6sd5GaFo53igZ4AreaNKGKWx6s1dE/nMqlldE/nMkpdE/nM/:B9R/0EW0W5d5GaO53R3NpKWx6s1y/nl0

Malware Config

Targets

    • Target

      6855375e420163d98f37b072226a4702_JaffaCakes118

    • Size

      12.0MB

    • MD5

      6855375e420163d98f37b072226a4702

    • SHA1

      10a02c5f2333568ee46b1e82be426e567c5dff54

    • SHA256

      8bcc0ecd8b289cb8461fb063e77833677f74a85a359dc6f956184de6cfd17232

    • SHA512

      22b2780127615013dc7e4f5b343f7b7fe1acc4a9655085b31d96fbd5e7c1f17c2f31262af14ca4607f58e10fac23989c3d62b2dbf3206c9a6b4edc58357ea71c

    • SSDEEP

      196608:BwqR/KjnEW0PO6sd5GaFo53igZ4AreaNKGKWx6s1dE/nMqlldE/nMkpdE/nM/:B9R/0EW0W5d5GaO53R3NpKWx6s1y/nl0

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks