General

  • Target

    696acdf4d4b9d7a79de1f8522a466bed_JaffaCakes118

  • Size

    307KB

  • Sample

    240523-cqh88sad76

  • MD5

    696acdf4d4b9d7a79de1f8522a466bed

  • SHA1

    1202ab7d8a6a4a9f5f74a3e7c992b0d53d1fd72a

  • SHA256

    f7dcea67f15ed1a461dea73515e7ecd467e86901da7b72280aa23396aee76d98

  • SHA512

    bc840a616b288695ff0a05045195bc669cd0c60968c3b632e709d2319f771f98ae5c4773f676112a1c5e04fea2dcb645ea9b550bc478604232732ab6ffb9b00b

  • SSDEEP

    6144:V1UFRQ98qOm76nUgUHuzie9rx4g66zG6uPPJ2Jfo2Cd8IHcDi+NSYIS6tODNafj+:V4Q98zqcUgxr91qUACmcDi+AtoNQI

Malware Config

Targets

    • Target

      696acdf4d4b9d7a79de1f8522a466bed_JaffaCakes118

    • Size

      307KB

    • MD5

      696acdf4d4b9d7a79de1f8522a466bed

    • SHA1

      1202ab7d8a6a4a9f5f74a3e7c992b0d53d1fd72a

    • SHA256

      f7dcea67f15ed1a461dea73515e7ecd467e86901da7b72280aa23396aee76d98

    • SHA512

      bc840a616b288695ff0a05045195bc669cd0c60968c3b632e709d2319f771f98ae5c4773f676112a1c5e04fea2dcb645ea9b550bc478604232732ab6ffb9b00b

    • SSDEEP

      6144:V1UFRQ98qOm76nUgUHuzie9rx4g66zG6uPPJ2Jfo2Cd8IHcDi+NSYIS6tODNafj+:V4Q98zqcUgxr91qUACmcDi+AtoNQI

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Tries to add a device administrator.

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks