General

  • Target

    687df458e2f4da546296064cb7cc6825_JaffaCakes118

  • Size

    465KB

  • Sample

    240522-y3grtsfb98

  • MD5

    687df458e2f4da546296064cb7cc6825

  • SHA1

    054683165e12ebe6a81e675402159e0a68694e9e

  • SHA256

    4f441e910cd3e579882b755a743ccc8328923041a990814cab620798d30da6ba

  • SHA512

    61939415e076ca97634fd4d57178c444370f4458ef51772061bf37938cf12050e096b65b869b5063f3dfd1e09aa1369fd593373d26a600f300e7818a966e3bc9

  • SSDEEP

    6144:Se4rdju2H/U4StDw0LxErY2YYYYYYsFcr+7lY2aHFdWRN+Ufqk3ITbgI:Se4r5U4S1GSFZWH6RoUfN4XgI

Malware Config

Targets

    • Target

      687df458e2f4da546296064cb7cc6825_JaffaCakes118

    • Size

      465KB

    • MD5

      687df458e2f4da546296064cb7cc6825

    • SHA1

      054683165e12ebe6a81e675402159e0a68694e9e

    • SHA256

      4f441e910cd3e579882b755a743ccc8328923041a990814cab620798d30da6ba

    • SHA512

      61939415e076ca97634fd4d57178c444370f4458ef51772061bf37938cf12050e096b65b869b5063f3dfd1e09aa1369fd593373d26a600f300e7818a966e3bc9

    • SSDEEP

      6144:Se4rdju2H/U4StDw0LxErY2YYYYYYsFcr+7lY2aHFdWRN+Ufqk3ITbgI:Se4r5U4S1GSFZWH6RoUfN4XgI

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks