General

  • Target

    6d0a365fa5822d00ac52aac793dff111_JaffaCakes118

  • Size

    8.4MB

  • Sample

    240524-cqdczshg31

  • MD5

    6d0a365fa5822d00ac52aac793dff111

  • SHA1

    d8c7d060dccd6a4d11c7b1afa2a998ee6ba4c77e

  • SHA256

    3e9e5e4eefb712fa9f8eccc89123b1232c696c7d43bbbfbe37e262429eaff39b

  • SHA512

    d58a78457e6b77b74cb8587e024d4212d2d45224058cd6ad9561536075f58b2857948d5c9b3ed3f1ac03a1c475d56b8de29301e2608d53e8c6af990a055f2b85

  • SSDEEP

    196608:38siY+jl9G6odpg7c9KshRdJngbZlpHDOKb2IcX661f7VXo9wH:38siY+jtodK7cThjxKZOKx6zXomH

Malware Config

Targets

    • Target

      6d0a365fa5822d00ac52aac793dff111_JaffaCakes118

    • Size

      8.4MB

    • MD5

      6d0a365fa5822d00ac52aac793dff111

    • SHA1

      d8c7d060dccd6a4d11c7b1afa2a998ee6ba4c77e

    • SHA256

      3e9e5e4eefb712fa9f8eccc89123b1232c696c7d43bbbfbe37e262429eaff39b

    • SHA512

      d58a78457e6b77b74cb8587e024d4212d2d45224058cd6ad9561536075f58b2857948d5c9b3ed3f1ac03a1c475d56b8de29301e2608d53e8c6af990a055f2b85

    • SSDEEP

      196608:38siY+jl9G6odpg7c9KshRdJngbZlpHDOKb2IcX661f7VXo9wH:38siY+jtodK7cThjxKZOKx6zXomH

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Matrix

Tasks