General

  • Target

    6aa26f32182021ce0cf3d363f24e9a04_JaffaCakes118

  • Size

    1.7MB

  • Sample

    240523-mf36rsda8v

  • MD5

    6aa26f32182021ce0cf3d363f24e9a04

  • SHA1

    019963bc8671295ad271be3f5d101dbf7ea8648f

  • SHA256

    8c8beccce2bccea14fa6fd1426ced3963b13a713aaacf163e4f51b21bb081649

  • SHA512

    860dcd5e35d17ba0222975ecbac202fdf4df3c59355d6901fe02c21603c8d6cfe3e88141c2549ce6c986ebdb0bf197c47762ee2c8f93a6fb35f5b6a5d368fab8

  • SSDEEP

    49152:UWH486el8BSg2Rw37ZDqAx9iIemx1F4Hrmhkxlgr5PkclxdXx45qv+M5GQdQXsJ+:UWH486el8B537ZmAx9ivmH4mhTr5nlrK

Malware Config

Targets

    • Target

      6aa26f32182021ce0cf3d363f24e9a04_JaffaCakes118

    • Size

      1.7MB

    • MD5

      6aa26f32182021ce0cf3d363f24e9a04

    • SHA1

      019963bc8671295ad271be3f5d101dbf7ea8648f

    • SHA256

      8c8beccce2bccea14fa6fd1426ced3963b13a713aaacf163e4f51b21bb081649

    • SHA512

      860dcd5e35d17ba0222975ecbac202fdf4df3c59355d6901fe02c21603c8d6cfe3e88141c2549ce6c986ebdb0bf197c47762ee2c8f93a6fb35f5b6a5d368fab8

    • SSDEEP

      49152:UWH486el8BSg2Rw37ZDqAx9iIemx1F4Hrmhkxlgr5PkclxdXx45qv+M5GQdQXsJ+:UWH486el8B537ZmAx9ivmH4mhTr5nlrK

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Matrix

Tasks