General

  • Target

    ea2d239649ce5a6cd4a8d991f1416107_JaffaCakes118

  • Size

    11.0MB

  • Sample

    240409-rlwq4ahc43

  • MD5

    ea2d239649ce5a6cd4a8d991f1416107

  • SHA1

    5a8572d3e593d4e8bad748cd40f81ba5f13f57c4

  • SHA256

    767b7ec6d30dfd7117f7ffb29764a1b92f0aa228f699e4ce6031e3590ff70a20

  • SHA512

    0ce10cbf0bebbf181f53c0366552c94911dab1397ae8cc7e75d21f9152508352fc56751c9eaa092722b2ecee7819a05427047af2619d873b01a33a2306a3a22f

  • SSDEEP

    196608:slHPedCEXYQkXPXbWVzIzxkOzvoLq1hjXUFtnJjFBylIQJjCHgColSK9a9eCC:slATk/XaGvkwjXUtJxq7MgDX9Ye1

Malware Config

Targets

    • Target

      ea2d239649ce5a6cd4a8d991f1416107_JaffaCakes118

    • Size

      11.0MB

    • MD5

      ea2d239649ce5a6cd4a8d991f1416107

    • SHA1

      5a8572d3e593d4e8bad748cd40f81ba5f13f57c4

    • SHA256

      767b7ec6d30dfd7117f7ffb29764a1b92f0aa228f699e4ce6031e3590ff70a20

    • SHA512

      0ce10cbf0bebbf181f53c0366552c94911dab1397ae8cc7e75d21f9152508352fc56751c9eaa092722b2ecee7819a05427047af2619d873b01a33a2306a3a22f

    • SSDEEP

      196608:slHPedCEXYQkXPXbWVzIzxkOzvoLq1hjXUFtnJjFBylIQJjCHgColSK9a9eCC:slATk/XaGvkwjXUtJxq7MgDX9Ye1

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks Android system properties for emulator presence.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device.

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks