General

  • Target

    69b7518ac46ec59c4f7e81b74fbb08a9_JaffaCakes118

  • Size

    3.3MB

  • Sample

    240523-e1h3bsdf8w

  • MD5

    69b7518ac46ec59c4f7e81b74fbb08a9

  • SHA1

    9d5ceeecfa67d0a61f572d29c7e2f3e15afae2ad

  • SHA256

    ccc00b8b9dd39b4bd7b2c7bac8a0467b659446f16b70e4425525df4fade545b6

  • SHA512

    607e4d66aede9cab5c0c643ba7be46c376241b962684f18e9b126f34d8c4ce53823fd7d0390f023ff65b3d39dd90cd0141bead07d2552f5ed20a56e6730bcca5

  • SSDEEP

    98304:CJy7KPSx9r0FNL5D+g64j7BVMHDgXHT/epxOtywXN3P0ZKPS9:CRI9r9QdaArq

Malware Config

Targets

    • Target

      69b7518ac46ec59c4f7e81b74fbb08a9_JaffaCakes118

    • Size

      3.3MB

    • MD5

      69b7518ac46ec59c4f7e81b74fbb08a9

    • SHA1

      9d5ceeecfa67d0a61f572d29c7e2f3e15afae2ad

    • SHA256

      ccc00b8b9dd39b4bd7b2c7bac8a0467b659446f16b70e4425525df4fade545b6

    • SHA512

      607e4d66aede9cab5c0c643ba7be46c376241b962684f18e9b126f34d8c4ce53823fd7d0390f023ff65b3d39dd90cd0141bead07d2552f5ed20a56e6730bcca5

    • SSDEEP

      98304:CJy7KPSx9r0FNL5D+g64j7BVMHDgXHT/epxOtywXN3P0ZKPS9:CRI9r9QdaArq

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Matrix

Tasks