General

  • Target

    6a834fa8cdb86a88794aff04c4e61486_JaffaCakes118

  • Size

    11.7MB

  • Sample

    240523-lmelbacb64

  • MD5

    6a834fa8cdb86a88794aff04c4e61486

  • SHA1

    2c621eb94fa5959b43d66af1de46b7518ea6e254

  • SHA256

    b4bdef95ba6ca5d7108dbe4f8e37c13232380714b045666a9563d015cae3ea30

  • SHA512

    0732c0dc0502feb7300ae0f4f26c5fe58a34492c9f12569b7e1ec3250b2ebf5fb887e85ea6ba483245aa82e4555e1f0137a7baf6c2dd63c582a6d40535eed001

  • SSDEEP

    196608:RTu638ZsM7PV3NoxRyuTgAd34LAO52oYSRSk06PWi42FPNZsqP1q8918PHQhy/Ai:V3YZyxRrX34MO52oMbqtlgqP1Awmd

Malware Config

Targets

    • Target

      6a834fa8cdb86a88794aff04c4e61486_JaffaCakes118

    • Size

      11.7MB

    • MD5

      6a834fa8cdb86a88794aff04c4e61486

    • SHA1

      2c621eb94fa5959b43d66af1de46b7518ea6e254

    • SHA256

      b4bdef95ba6ca5d7108dbe4f8e37c13232380714b045666a9563d015cae3ea30

    • SHA512

      0732c0dc0502feb7300ae0f4f26c5fe58a34492c9f12569b7e1ec3250b2ebf5fb887e85ea6ba483245aa82e4555e1f0137a7baf6c2dd63c582a6d40535eed001

    • SSDEEP

      196608:RTu638ZsM7PV3NoxRyuTgAd34LAO52oYSRSk06PWi42FPNZsqP1q8918PHQhy/Ai:V3YZyxRrX34MO52oMbqtlgqP1Awmd

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads the content of photos stored on the user's device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks if the internet connection is available

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks