General

  • Target

    6f237444cfa69ee57a3410c2408d1325_JaffaCakes118

  • Size

    15.0MB

  • Sample

    240524-t24sraca5y

  • MD5

    6f237444cfa69ee57a3410c2408d1325

  • SHA1

    275b61dbf12d1086b6651b03be113f6bafbc1f46

  • SHA256

    37d50bb030563d6279a0961e0e5c9e0a1c382db53256b52652e5eac5e67595e7

  • SHA512

    76a5c1b77336005f3c911b41034882a7fcefcd0bbe1b786a2ff48f2411438e194c2170701a5e9e83b67c138c28f1cc73f96687498519a9024807b06832860372

  • SSDEEP

    393216:CS7B0RzxGWNfEziOjDMSsO+Cs4Afn7J480ZAen09e9yES:CxR84SsR4Ae80Zc0fS

Malware Config

Targets

    • Target

      6f237444cfa69ee57a3410c2408d1325_JaffaCakes118

    • Size

      15.0MB

    • MD5

      6f237444cfa69ee57a3410c2408d1325

    • SHA1

      275b61dbf12d1086b6651b03be113f6bafbc1f46

    • SHA256

      37d50bb030563d6279a0961e0e5c9e0a1c382db53256b52652e5eac5e67595e7

    • SHA512

      76a5c1b77336005f3c911b41034882a7fcefcd0bbe1b786a2ff48f2411438e194c2170701a5e9e83b67c138c28f1cc73f96687498519a9024807b06832860372

    • SSDEEP

      393216:CS7B0RzxGWNfEziOjDMSsO+Cs4Afn7J480ZAen09e9yES:CxR84SsR4Ae80Zc0fS

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks