General

  • Target

    6bd8da308c7cf8fa0da1e611d4a9b087_JaffaCakes118

  • Size

    30.7MB

  • Sample

    240523-wy8nmsbf5s

  • MD5

    6bd8da308c7cf8fa0da1e611d4a9b087

  • SHA1

    73fe9508c5d1aa3ceca2ce394040c91f87b2fcf7

  • SHA256

    77ad84363ada96222848165d94f8d192d574486f7ea1a7dd50963fda42afa994

  • SHA512

    edc6d6bdd2fd0cb15f6a079d55c618a368f10e3711f5db2d30ddb6b75e1213e8ffc1ebc6a1a27ad2454bdab3d6bb9b6a85c4ae1d62f41eeae8065b1a0899832e

  • SSDEEP

    786432:VDLNiBWUOYdzrn0YeoOlJOeLwxmlZmjQd8+z7z:N8AUVf04OlJOaSmv9d7

Malware Config

Targets

    • Target

      6bd8da308c7cf8fa0da1e611d4a9b087_JaffaCakes118

    • Size

      30.7MB

    • MD5

      6bd8da308c7cf8fa0da1e611d4a9b087

    • SHA1

      73fe9508c5d1aa3ceca2ce394040c91f87b2fcf7

    • SHA256

      77ad84363ada96222848165d94f8d192d574486f7ea1a7dd50963fda42afa994

    • SHA512

      edc6d6bdd2fd0cb15f6a079d55c618a368f10e3711f5db2d30ddb6b75e1213e8ffc1ebc6a1a27ad2454bdab3d6bb9b6a85c4ae1d62f41eeae8065b1a0899832e

    • SSDEEP

      786432:VDLNiBWUOYdzrn0YeoOlJOeLwxmlZmjQd8+z7z:N8AUVf04OlJOaSmv9d7

    • Checks if the Android device is rooted.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the phone number (MSISDN for GSM devices)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks