General

  • Target

    68540843979bfc1cdad23957d1b54cff_JaffaCakes118

  • Size

    10.7MB

  • Sample

    240522-xzfvpadd69

  • MD5

    68540843979bfc1cdad23957d1b54cff

  • SHA1

    6e9430d3920423a90d9ef560ef7f57a39ea9ce54

  • SHA256

    28631b5c7e1f701e15adfdd23c029023af681d8ad7f663846f83f4391a2b0243

  • SHA512

    8f715de81547dde9bbf1ce71bd346ce2f5d1b22b9c9fa48a883860d31d4c2202fe872b580dc152a7672aee1cab068b8e19b8190ad9a06fd2a7b9db79249f3994

  • SSDEEP

    196608:7XjoMqwCxKEbA7tpDfvVbDSrtgZQpmP/KQNwDnEzjm48UL366XUPvh:7XjoMHCxKy2ztSrtgZ1P/P+nmV8ULVXe

Malware Config

Targets

    • Target

      68540843979bfc1cdad23957d1b54cff_JaffaCakes118

    • Size

      10.7MB

    • MD5

      68540843979bfc1cdad23957d1b54cff

    • SHA1

      6e9430d3920423a90d9ef560ef7f57a39ea9ce54

    • SHA256

      28631b5c7e1f701e15adfdd23c029023af681d8ad7f663846f83f4391a2b0243

    • SHA512

      8f715de81547dde9bbf1ce71bd346ce2f5d1b22b9c9fa48a883860d31d4c2202fe872b580dc152a7672aee1cab068b8e19b8190ad9a06fd2a7b9db79249f3994

    • SSDEEP

      196608:7XjoMqwCxKEbA7tpDfvVbDSrtgZQpmP/KQNwDnEzjm48UL366XUPvh:7XjoMHCxKy2ztSrtgZ1P/P+nmV8ULVXe

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks