General

  • Target

    697a6472ed5f06d54b42064e5e6850f9_JaffaCakes118

  • Size

    2.3MB

  • Sample

    240523-c6kr1abb78

  • MD5

    697a6472ed5f06d54b42064e5e6850f9

  • SHA1

    20a9f3b505707157cf6c4408c6c66de0c2b47e09

  • SHA256

    db0a1bc3fd2329470b9ba4df85badecd3cba7b5ac997f3c04e7f4a1dc1faaf73

  • SHA512

    7c7a3a32f4af5a23bc94479e9ab76caaca2bfd899cd973f4cfef90a61855c23c96f50594b88e1002e787eb0c94f0411abd6ffdab00bf72cf8dfd921540d11355

  • SSDEEP

    49152:tzZSmIi856LJMe39AsDzX90b6AIoBN5/NNyf:vvIiDyP2z9dLoBN5yf

Malware Config

Targets

    • Target

      697a6472ed5f06d54b42064e5e6850f9_JaffaCakes118

    • Size

      2.3MB

    • MD5

      697a6472ed5f06d54b42064e5e6850f9

    • SHA1

      20a9f3b505707157cf6c4408c6c66de0c2b47e09

    • SHA256

      db0a1bc3fd2329470b9ba4df85badecd3cba7b5ac997f3c04e7f4a1dc1faaf73

    • SHA512

      7c7a3a32f4af5a23bc94479e9ab76caaca2bfd899cd973f4cfef90a61855c23c96f50594b88e1002e787eb0c94f0411abd6ffdab00bf72cf8dfd921540d11355

    • SSDEEP

      49152:tzZSmIi856LJMe39AsDzX90b6AIoBN5/NNyf:vvIiDyP2z9dLoBN5yf

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks