General

  • Target

    6e02ac4c6cf71350ba8aeb7db6a7c0b0_JaffaCakes118

  • Size

    11.4MB

  • Sample

    240524-k7v85acc77

  • MD5

    6e02ac4c6cf71350ba8aeb7db6a7c0b0

  • SHA1

    da9464111b3ffe3677bc60eba512c80e3bf1d3b8

  • SHA256

    a76d998bdec295b5edd86fa0fb38978862cdfe8de57f9ecc152769a628bd7e10

  • SHA512

    351bab467add06bd22af1d2f2efe9b16cb1da42f6f637360e03d2d236aded19e81fda4bdfdfcfc971dbcb3af785d9de6a5704c2f3d423015881ef864e1793e61

  • SSDEEP

    196608:5DYXa05tUGKR1vt8CxSyC469GweJ7sDmELFiZmxB+37FHtLOzBTjnPxo:5kX5UpXFrxZr69WJ4xiUnC+zBTjPO

Malware Config

Targets

    • Target

      6e02ac4c6cf71350ba8aeb7db6a7c0b0_JaffaCakes118

    • Size

      11.4MB

    • MD5

      6e02ac4c6cf71350ba8aeb7db6a7c0b0

    • SHA1

      da9464111b3ffe3677bc60eba512c80e3bf1d3b8

    • SHA256

      a76d998bdec295b5edd86fa0fb38978862cdfe8de57f9ecc152769a628bd7e10

    • SHA512

      351bab467add06bd22af1d2f2efe9b16cb1da42f6f637360e03d2d236aded19e81fda4bdfdfcfc971dbcb3af785d9de6a5704c2f3d423015881ef864e1793e61

    • SSDEEP

      196608:5DYXa05tUGKR1vt8CxSyC469GweJ7sDmELFiZmxB+37FHtLOzBTjnPxo:5kX5UpXFrxZr69WJ4xiUnC+zBTjPO

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks