General

  • Target

    693d40fc6d36ab0ab553ad3bc61d2545_JaffaCakes118

  • Size

    12.7MB

  • Sample

    240523-bg1w9afh3t

  • MD5

    693d40fc6d36ab0ab553ad3bc61d2545

  • SHA1

    f669e60fa44e5d5c9875f29921a1b67fdae97330

  • SHA256

    604264b966ad95f727eff53eac5d372a38a1506afa64b53e71d44d2f84e7fff0

  • SHA512

    ce3c37e3e8bb1d024e29b68aec660e765b971b0218cfb98b1cb4fc0becd689b47ad8332c2e387f33bc2f6700681b75877d7c65eb478b7f3f066585229181d7d6

  • SSDEEP

    393216:9IeXRTF6oTRXNzB4HI5GtDlKOgW42XNGurFH9no:9IiTF1Tt4o5GrKzxC9rFdno

Malware Config

Targets

    • Target

      693d40fc6d36ab0ab553ad3bc61d2545_JaffaCakes118

    • Size

      12.7MB

    • MD5

      693d40fc6d36ab0ab553ad3bc61d2545

    • SHA1

      f669e60fa44e5d5c9875f29921a1b67fdae97330

    • SHA256

      604264b966ad95f727eff53eac5d372a38a1506afa64b53e71d44d2f84e7fff0

    • SHA512

      ce3c37e3e8bb1d024e29b68aec660e765b971b0218cfb98b1cb4fc0becd689b47ad8332c2e387f33bc2f6700681b75877d7c65eb478b7f3f066585229181d7d6

    • SSDEEP

      393216:9IeXRTF6oTRXNzB4HI5GtDlKOgW42XNGurFH9no:9IiTF1Tt4o5GrKzxC9rFdno

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks