General

  • Target

    773ff95a1c6c53bc1d6400d8962125ad_JaffaCakes118

  • Size

    594KB

  • Sample

    240527-aa1r8sgh6s

  • MD5

    773ff95a1c6c53bc1d6400d8962125ad

  • SHA1

    5e9cca3061bb368f38e92bba36372ef625499ce2

  • SHA256

    8e3180f2e9f98f92cfffab714ba4d8dff38ec9cbcc97f28b6a6889a4a80faf1c

  • SHA512

    ad66c3923c4b4ae6ca7517dec7dfb837bfcaaae5a6871080cfc03a8a37b35ccfde5bfd99dfa60f1970b0654030903039db7b459a02e5ac8ca09d792af8c751c8

  • SSDEEP

    12288:+RU7eiS0dWvUMsED6BYlVwptxgTsOO009Tp0XnvAQiEjbj:+RP0IvnsEDXixgA1N8hiWj

Malware Config

Targets

    • Target

      773ff95a1c6c53bc1d6400d8962125ad_JaffaCakes118

    • Size

      594KB

    • MD5

      773ff95a1c6c53bc1d6400d8962125ad

    • SHA1

      5e9cca3061bb368f38e92bba36372ef625499ce2

    • SHA256

      8e3180f2e9f98f92cfffab714ba4d8dff38ec9cbcc97f28b6a6889a4a80faf1c

    • SHA512

      ad66c3923c4b4ae6ca7517dec7dfb837bfcaaae5a6871080cfc03a8a37b35ccfde5bfd99dfa60f1970b0654030903039db7b459a02e5ac8ca09d792af8c751c8

    • SSDEEP

      12288:+RU7eiS0dWvUMsED6BYlVwptxgTsOO009Tp0XnvAQiEjbj:+RP0IvnsEDXixgA1N8hiWj

    • Removes its main activity from the application launcher

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks