General

  • Target

    69a51648a6af3b23a5477694a8768bd0_JaffaCakes118

  • Size

    25.0MB

  • Sample

    240523-eexzcsch8v

  • MD5

    69a51648a6af3b23a5477694a8768bd0

  • SHA1

    44e8088955b3679b8d0f81fb555b6e22a85fb752

  • SHA256

    e7c20ba964047119e3ad7ce0fea058918cff288ef3ad470706079d539092fcaf

  • SHA512

    6d2332b2b676d85d8e08231301ea18ade1bdf0bff52936e2bc36d6828e6aa7b2540ddb3b6e9d2c369269f161eca0070f2bbe05caf0719ba3780f0d3d166e33c2

  • SSDEEP

    786432:NCKx0syiL5wVFFsBiWtqmyM2L6FRWOm1pzg:TBiYiWtqvM2SRRm1pzg

Malware Config

Targets

    • Target

      69a51648a6af3b23a5477694a8768bd0_JaffaCakes118

    • Size

      25.0MB

    • MD5

      69a51648a6af3b23a5477694a8768bd0

    • SHA1

      44e8088955b3679b8d0f81fb555b6e22a85fb752

    • SHA256

      e7c20ba964047119e3ad7ce0fea058918cff288ef3ad470706079d539092fcaf

    • SHA512

      6d2332b2b676d85d8e08231301ea18ade1bdf0bff52936e2bc36d6828e6aa7b2540ddb3b6e9d2c369269f161eca0070f2bbe05caf0719ba3780f0d3d166e33c2

    • SSDEEP

      786432:NCKx0syiL5wVFFsBiWtqmyM2L6FRWOm1pzg:TBiYiWtqvM2SRRm1pzg

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks