General

  • Target

    6d487c0c213c35bc605d5750fee2c9e7_JaffaCakes118

  • Size

    28.5MB

  • Sample

    240524-em36cace2x

  • MD5

    6d487c0c213c35bc605d5750fee2c9e7

  • SHA1

    8c2b67716f97d47c481d689f624827483228d43d

  • SHA256

    f6692c2aaf199bce313d88a25867e5b2345dd797cc4cd55dcb632db3a1403b3a

  • SHA512

    24aca1e881db32d4bca12c339f5355a6c971ce58e4fa47f309f4861f81e32662ddf5f807f4f0e295eb45488d61c31102a6da1f92d02573e9f2b3a90209ddfe11

  • SSDEEP

    393216:Nym8o8pBtfb7SG+3eXiwROLDW2DWWHLe3hickZ4ic5TJka2LUyLt7P/hPxwykowK:NHifbp+uXlcWELcYhGtsLFPAK

Malware Config

Targets

    • Target

      6d487c0c213c35bc605d5750fee2c9e7_JaffaCakes118

    • Size

      28.5MB

    • MD5

      6d487c0c213c35bc605d5750fee2c9e7

    • SHA1

      8c2b67716f97d47c481d689f624827483228d43d

    • SHA256

      f6692c2aaf199bce313d88a25867e5b2345dd797cc4cd55dcb632db3a1403b3a

    • SHA512

      24aca1e881db32d4bca12c339f5355a6c971ce58e4fa47f309f4861f81e32662ddf5f807f4f0e295eb45488d61c31102a6da1f92d02573e9f2b3a90209ddfe11

    • SSDEEP

      393216:Nym8o8pBtfb7SG+3eXiwROLDW2DWWHLe3hickZ4ic5TJka2LUyLt7P/hPxwykowK:NHifbp+uXlcWELcYhGtsLFPAK

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Matrix

Tasks