General

  • Target

    6a9c8ed5cba2781bdd66a139e65b3847_JaffaCakes118

  • Size

    28.9MB

  • Sample

    240523-l98snsch37

  • MD5

    6a9c8ed5cba2781bdd66a139e65b3847

  • SHA1

    d32f6cf7e9ea78f741f339a7388a2120e27b9f3c

  • SHA256

    7ee64ded702588b0927db5345f7476284f2b48e4dcaa243a7cad176baee18441

  • SHA512

    fe8c8b357fae093a72fddbdd357e027bae16862d655bf4421303d5a13293e2b4838554f30a1e3af15053ff77092f7b11bcf72c77b3d98b6e64df8c53d96e9135

  • SSDEEP

    393216:v+GC9FI1Ux0qKCUWAOjas0lgiurWlG95ObBZ04krqD2G5GFKCrZFsxDdvBA78B2o:v+f9i7/CJascgZOGLoU4fSaGEC1ucQcu

Malware Config

Targets

    • Target

      6a9c8ed5cba2781bdd66a139e65b3847_JaffaCakes118

    • Size

      28.9MB

    • MD5

      6a9c8ed5cba2781bdd66a139e65b3847

    • SHA1

      d32f6cf7e9ea78f741f339a7388a2120e27b9f3c

    • SHA256

      7ee64ded702588b0927db5345f7476284f2b48e4dcaa243a7cad176baee18441

    • SHA512

      fe8c8b357fae093a72fddbdd357e027bae16862d655bf4421303d5a13293e2b4838554f30a1e3af15053ff77092f7b11bcf72c77b3d98b6e64df8c53d96e9135

    • SSDEEP

      393216:v+GC9FI1Ux0qKCUWAOjas0lgiurWlG95ObBZ04krqD2G5GFKCrZFsxDdvBA78B2o:v+f9i7/CJascgZOGLoU4fSaGEC1ucQcu

    • Renames multiple (80) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

MITRE ATT&CK Matrix

Tasks