General

  • Target

    6aae5ee17539a3b43f9da6275027a464_JaffaCakes118

  • Size

    14.1MB

  • Sample

    240523-mtlhwade77

  • MD5

    6aae5ee17539a3b43f9da6275027a464

  • SHA1

    aba3af5e452e2c066713590ffb385c7c66e417dd

  • SHA256

    0c459507288e3e6853327659c51c48b198e8a73a32af1e450e5205c6c3ad835e

  • SHA512

    feb62c31b851f821d1bd4c43dd2babc67597b695b96d10a428d91f3da9503c7c4fccfe894c5b1cf5f6770ffc850cdc54cfd5f20c6dfc26b62a8c749f1519269a

  • SSDEEP

    196608:U7HChNcpjHD+TLHZMK29SyyIA19VxuU9m3KiiRphPmTjGeXm1cIM1n+7d8PL:UtHmjyA19FoXiRphPmTqFc272

Malware Config

Targets

    • Target

      6aae5ee17539a3b43f9da6275027a464_JaffaCakes118

    • Size

      14.1MB

    • MD5

      6aae5ee17539a3b43f9da6275027a464

    • SHA1

      aba3af5e452e2c066713590ffb385c7c66e417dd

    • SHA256

      0c459507288e3e6853327659c51c48b198e8a73a32af1e450e5205c6c3ad835e

    • SHA512

      feb62c31b851f821d1bd4c43dd2babc67597b695b96d10a428d91f3da9503c7c4fccfe894c5b1cf5f6770ffc850cdc54cfd5f20c6dfc26b62a8c749f1519269a

    • SSDEEP

      196608:U7HChNcpjHD+TLHZMK29SyyIA19VxuU9m3KiiRphPmTjGeXm1cIM1n+7d8PL:UtHmjyA19FoXiRphPmTqFc272

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks