General

  • Target

    6d116839d465b55353095a21d305d553_JaffaCakes118

  • Size

    3.3MB

  • Sample

    240524-c11k9sab89

  • MD5

    6d116839d465b55353095a21d305d553

  • SHA1

    32e3801fe794af6bee712e825a4ed97e73f12bef

  • SHA256

    b31b6b3b7fefbd42b230e3c99ebb6641046ca0d31bc7fee0fd7220d5c1990081

  • SHA512

    ff8f1333ee18f54def3e286b2a9794d72e0fc8d1464c0264286fbe49b43555840f2fb13ccf4f5f84aa1a42cacacfa2ed33a03ca65264ca758023e9dc77ee0b8f

  • SSDEEP

    98304:RohWAo3eZru6tvBsYrcnfRrxgzKnUTxWohL/BH2OtywXF3oyVAoVgIR:RogneZS6BBrcnfRrxgmnQzRT

Malware Config

Targets

    • Target

      6d116839d465b55353095a21d305d553_JaffaCakes118

    • Size

      3.3MB

    • MD5

      6d116839d465b55353095a21d305d553

    • SHA1

      32e3801fe794af6bee712e825a4ed97e73f12bef

    • SHA256

      b31b6b3b7fefbd42b230e3c99ebb6641046ca0d31bc7fee0fd7220d5c1990081

    • SHA512

      ff8f1333ee18f54def3e286b2a9794d72e0fc8d1464c0264286fbe49b43555840f2fb13ccf4f5f84aa1a42cacacfa2ed33a03ca65264ca758023e9dc77ee0b8f

    • SSDEEP

      98304:RohWAo3eZru6tvBsYrcnfRrxgzKnUTxWohL/BH2OtywXF3oyVAoVgIR:RogneZS6BBrcnfRrxgmnQzRT

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Matrix

Tasks