General

  • Target

    6bf63b21664fed6b13c6546bb7a4a6c4_JaffaCakes118

  • Size

    22.6MB

  • Sample

    240523-xp2dmscf5v

  • MD5

    6bf63b21664fed6b13c6546bb7a4a6c4

  • SHA1

    54d35ddd13c6d94d31b8d2181a23069fd86e3d14

  • SHA256

    8652ba3c5e27536c73517f572edf483eeddc424502c206cb04fda23881886d95

  • SHA512

    3328918e6059a55533db22ad6b1eddf7db90346fc4b21ca91b9e6919de95d28ed2ccaad7f5291e1cfd61ca946d3f564650dce7a8260074030b4ff0c154d431c6

  • SSDEEP

    393216:wE6dC0ZjxqFgqs/9dqc8l6zrlNh7cGUs/NxL9Uld95ibf:H6dtx1qH6zlGsVdOld6bf

Malware Config

Targets

    • Target

      6bf63b21664fed6b13c6546bb7a4a6c4_JaffaCakes118

    • Size

      22.6MB

    • MD5

      6bf63b21664fed6b13c6546bb7a4a6c4

    • SHA1

      54d35ddd13c6d94d31b8d2181a23069fd86e3d14

    • SHA256

      8652ba3c5e27536c73517f572edf483eeddc424502c206cb04fda23881886d95

    • SHA512

      3328918e6059a55533db22ad6b1eddf7db90346fc4b21ca91b9e6919de95d28ed2ccaad7f5291e1cfd61ca946d3f564650dce7a8260074030b4ff0c154d431c6

    • SSDEEP

      393216:wE6dC0ZjxqFgqs/9dqc8l6zrlNh7cGUs/NxL9Uld95ibf:H6dtx1qH6zlGsVdOld6bf

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

    • Reads the content of photos stored on the user's device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks