General

  • Target

    69c89ba38630a9aa22367c48cc1072d0_JaffaCakes118

  • Size

    12.6MB

  • Sample

    240523-fg415aed52

  • MD5

    69c89ba38630a9aa22367c48cc1072d0

  • SHA1

    e920c5de89a3338afd4caaa8e372cd99b5bd2d80

  • SHA256

    1e88b3696e7be109ee031123abae5f2c579f022162035f12afc7461c56a5d407

  • SHA512

    d5d4f4bae9e373b83fee07f18fe08abb23cc7669df90493b5587a0afacbfe82ebcbca8437eedc954e337d6dfedec22b52bac40dbe1cfefdf23ca83c56cc23fc4

  • SSDEEP

    393216:zQCVy8cNOzfhAdIC2aDKcwDKcj5Kj3n0TpqEBu:pA8oOzG2MDKPDK6c0TpqR

Malware Config

Targets

    • Target

      69c89ba38630a9aa22367c48cc1072d0_JaffaCakes118

    • Size

      12.6MB

    • MD5

      69c89ba38630a9aa22367c48cc1072d0

    • SHA1

      e920c5de89a3338afd4caaa8e372cd99b5bd2d80

    • SHA256

      1e88b3696e7be109ee031123abae5f2c579f022162035f12afc7461c56a5d407

    • SHA512

      d5d4f4bae9e373b83fee07f18fe08abb23cc7669df90493b5587a0afacbfe82ebcbca8437eedc954e337d6dfedec22b52bac40dbe1cfefdf23ca83c56cc23fc4

    • SSDEEP

      393216:zQCVy8cNOzfhAdIC2aDKcwDKcj5Kj3n0TpqEBu:pA8oOzG2MDKPDK6c0TpqR

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks