General

  • Target

    6ec0c88bffdc25f8d2f105bd8bffe4eb_JaffaCakes118

  • Size

    113KB

  • Sample

    240524-ravdwsgf32

  • MD5

    6ec0c88bffdc25f8d2f105bd8bffe4eb

  • SHA1

    c2ba3a5ce58bce18a20f827767257d6e93c3fd03

  • SHA256

    beb8ab2de046cbba059eac4e57ce65f97101b757f8e3032186fb28e0e2caf0ed

  • SHA512

    005aa9a5ef84406e66acfaabdcdfdac1b077c41877ace2120e4179ce62b1fd2195840b906316e18e2fa31aa496aef41ed528cfe6662076a1f1d5cab8c606c18a

  • SSDEEP

    1536:qNpst2E4fWRTli8GE3MFDeKwJCj0wjAoq/jJV7kzwHOlvx5VYj0dZIzwimdbHg8d:6JEphddueKICAoq7JV7KlbVY8OGWgKBg

Malware Config

Targets

    • Target

      6ec0c88bffdc25f8d2f105bd8bffe4eb_JaffaCakes118

    • Size

      113KB

    • MD5

      6ec0c88bffdc25f8d2f105bd8bffe4eb

    • SHA1

      c2ba3a5ce58bce18a20f827767257d6e93c3fd03

    • SHA256

      beb8ab2de046cbba059eac4e57ce65f97101b757f8e3032186fb28e0e2caf0ed

    • SHA512

      005aa9a5ef84406e66acfaabdcdfdac1b077c41877ace2120e4179ce62b1fd2195840b906316e18e2fa31aa496aef41ed528cfe6662076a1f1d5cab8c606c18a

    • SSDEEP

      1536:qNpst2E4fWRTli8GE3MFDeKwJCj0wjAoq/jJV7kzwHOlvx5VYj0dZIzwimdbHg8d:6JEphddueKICAoq7JV7KlbVY8OGWgKBg

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Queries the phone number (MSISDN for GSM devices)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Matrix

Tasks