General

  • Target

    6eb9f3ad05408d99680f326d07d17a43_JaffaCakes118

  • Size

    7.5MB

  • Sample

    240524-q356esgc56

  • MD5

    6eb9f3ad05408d99680f326d07d17a43

  • SHA1

    f65aece0b21d29601291c8585dc361d7dbdcd55b

  • SHA256

    10384255c298d073bb93dea288b6d88fa83ea722a81c1b15cc784e5042fb6696

  • SHA512

    e41b86cfa6dd2d4b2032cb05a4f39a25e2d8cf478d45d21f597ea72e9e3ece93618d0b871457324245f0f4bf806fa444b2c35cc66f5783231a972877d923c5d9

  • SSDEEP

    196608:qlTTb1VF4n6s2iwQEZY7BkZatBOfd8ocnJoLrQA0AxoPG3nZTbXkAG:wTTbju6piwQBNkM2X3QQxoExLkv

Malware Config

Targets

    • Target

      6eb9f3ad05408d99680f326d07d17a43_JaffaCakes118

    • Size

      7.5MB

    • MD5

      6eb9f3ad05408d99680f326d07d17a43

    • SHA1

      f65aece0b21d29601291c8585dc361d7dbdcd55b

    • SHA256

      10384255c298d073bb93dea288b6d88fa83ea722a81c1b15cc784e5042fb6696

    • SHA512

      e41b86cfa6dd2d4b2032cb05a4f39a25e2d8cf478d45d21f597ea72e9e3ece93618d0b871457324245f0f4bf806fa444b2c35cc66f5783231a972877d923c5d9

    • SSDEEP

      196608:qlTTb1VF4n6s2iwQEZY7BkZatBOfd8ocnJoLrQA0AxoPG3nZTbXkAG:wTTbju6piwQBNkM2X3QQxoExLkv

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks