General

  • Target

    6f0db2c829b9c8d7486b76d531a976ae_JaffaCakes118

  • Size

    935KB

  • Sample

    240524-tdrhhsbe98

  • MD5

    6f0db2c829b9c8d7486b76d531a976ae

  • SHA1

    3ceca3a5e78d6395024e78a72a61c2c27567f08e

  • SHA256

    e0ad741fa8cc41963db96a0f58b9c83f00caa26e97d37ee1a91a50f6855b19c9

  • SHA512

    748a5d45450489e91691d99a33f672e3952675823a5f4bf488dd9949a4f871dc1dea4e4b5f0befb18dfb1d4cc257d6d83d1033895ea96413ec854119fa3b969c

  • SSDEEP

    12288:TTJFa2O78vsK/Tf1uL0q+xqh71/DQOQtAevGj1nRDzE3iUUnmiFwSow8g1W7APZr:878v+t+crzGtvyjEeqSoM1E+ZO6x

Malware Config

Targets

    • Target

      6f0db2c829b9c8d7486b76d531a976ae_JaffaCakes118

    • Size

      935KB

    • MD5

      6f0db2c829b9c8d7486b76d531a976ae

    • SHA1

      3ceca3a5e78d6395024e78a72a61c2c27567f08e

    • SHA256

      e0ad741fa8cc41963db96a0f58b9c83f00caa26e97d37ee1a91a50f6855b19c9

    • SHA512

      748a5d45450489e91691d99a33f672e3952675823a5f4bf488dd9949a4f871dc1dea4e4b5f0befb18dfb1d4cc257d6d83d1033895ea96413ec854119fa3b969c

    • SSDEEP

      12288:TTJFa2O78vsK/Tf1uL0q+xqh71/DQOQtAevGj1nRDzE3iUUnmiFwSow8g1W7APZr:878v+t+crzGtvyjEeqSoM1E+ZO6x

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Matrix

Tasks