General

  • Target

    6d27828d694f7cd6e228363669f2d6f8_JaffaCakes118

  • Size

    14.0MB

  • Sample

    240524-drn2jsbb2w

  • MD5

    6d27828d694f7cd6e228363669f2d6f8

  • SHA1

    1910c1a9ccb1ba227c1119388b9e799b6c427be5

  • SHA256

    a4f73010a538fa7ffc01a1ddfadb386f3fce4cdaf1132d6d780df9624f7cde9c

  • SHA512

    76fcf4c9530f96fb73afb77d66814a113c7d2cf878236fbed17df658c31f6d604c3a48174815751560c563926b34c6def3052e6524d05cb4e8e15989ba73bcc6

  • SSDEEP

    196608:20MowSpU7VL35o53Utlu8Y0kkXzq/la4MpEch68t+3NqSr6LWndV7FPzKp4HLDD4:24pIV3+pUvuykU3hRmz7bQaDdiMK

Malware Config

Targets

    • Target

      6d27828d694f7cd6e228363669f2d6f8_JaffaCakes118

    • Size

      14.0MB

    • MD5

      6d27828d694f7cd6e228363669f2d6f8

    • SHA1

      1910c1a9ccb1ba227c1119388b9e799b6c427be5

    • SHA256

      a4f73010a538fa7ffc01a1ddfadb386f3fce4cdaf1132d6d780df9624f7cde9c

    • SHA512

      76fcf4c9530f96fb73afb77d66814a113c7d2cf878236fbed17df658c31f6d604c3a48174815751560c563926b34c6def3052e6524d05cb4e8e15989ba73bcc6

    • SSDEEP

      196608:20MowSpU7VL35o53Utlu8Y0kkXzq/la4MpEch68t+3NqSr6LWndV7FPzKp4HLDD4:24pIV3+pUvuykU3hRmz7bQaDdiMK

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks