General

  • Target

    6a79cfa35020707afa59e53925c6b25d_JaffaCakes118

  • Size

    30.4MB

  • Sample

    240523-lcrswsbh46

  • MD5

    6a79cfa35020707afa59e53925c6b25d

  • SHA1

    1c6abcba85f9368f77c2a295a423cb806eafa722

  • SHA256

    dc8bd4acdb13d4a6ddc6b33f2a8096cf4fc7c89f24015d99331b64a83cee92d9

  • SHA512

    690498ab4bac78a0f192207233f38b27146a9769d88cf54f8abb690937cc4da0fbe4c98f30b5b8d466568cde1efa0b10884d8456f8d70881953572af0ad9827a

  • SSDEEP

    786432:UIEU1bIC7be4M5iWlOvZP0PsE4WLe32+Tk2CQHB8KB:v1MC7be33OBP0PsBMe3NTkkr

Malware Config

Targets

    • Target

      6a79cfa35020707afa59e53925c6b25d_JaffaCakes118

    • Size

      30.4MB

    • MD5

      6a79cfa35020707afa59e53925c6b25d

    • SHA1

      1c6abcba85f9368f77c2a295a423cb806eafa722

    • SHA256

      dc8bd4acdb13d4a6ddc6b33f2a8096cf4fc7c89f24015d99331b64a83cee92d9

    • SHA512

      690498ab4bac78a0f192207233f38b27146a9769d88cf54f8abb690937cc4da0fbe4c98f30b5b8d466568cde1efa0b10884d8456f8d70881953572af0ad9827a

    • SSDEEP

      786432:UIEU1bIC7be4M5iWlOvZP0PsE4WLe32+Tk2CQHB8KB:v1MC7be33OBP0PsBMe3NTkkr

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Matrix

Tasks