General

  • Target

    693210bbb99f6e229e77d06dd8a330ea_JaffaCakes118

  • Size

    23.4MB

  • Sample

    240523-a6rjfafc9t

  • MD5

    693210bbb99f6e229e77d06dd8a330ea

  • SHA1

    d7d13cdf92092a44b4414d4769dda5ed5119b302

  • SHA256

    aa6a1ded9eedeb72a1c8b8149094c1cf97ce38d0c540600ad4fbc138bfc7db88

  • SHA512

    2197ec71abdbbdd173d767079d1455e28b025edc873ef1c8482e2079ef4dcb22f27785276b77e47f8229d7c01f79fa674b04a6c1182e1bae85a41717362ecf87

  • SSDEEP

    393216:rKy0ZDhvVCBgc2dNS5pbq+xbnh1OrxK7gDcvVRLyWi1YsC+fgaS1aTvVcSJKzpOZ:rcZhvVCGtPGpb7Nnh0KO8ROt1NfjuaTV

Malware Config

Targets

    • Target

      693210bbb99f6e229e77d06dd8a330ea_JaffaCakes118

    • Size

      23.4MB

    • MD5

      693210bbb99f6e229e77d06dd8a330ea

    • SHA1

      d7d13cdf92092a44b4414d4769dda5ed5119b302

    • SHA256

      aa6a1ded9eedeb72a1c8b8149094c1cf97ce38d0c540600ad4fbc138bfc7db88

    • SHA512

      2197ec71abdbbdd173d767079d1455e28b025edc873ef1c8482e2079ef4dcb22f27785276b77e47f8229d7c01f79fa674b04a6c1182e1bae85a41717362ecf87

    • SSDEEP

      393216:rKy0ZDhvVCBgc2dNS5pbq+xbnh1OrxK7gDcvVRLyWi1YsC+fgaS1aTvVcSJKzpOZ:rcZhvVCGtPGpb7Nnh0KO8ROt1NfjuaTV

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks