General

  • Target

    f1a7d1243c170f040a655b081ce3e25e_JaffaCakes118

  • Size

    7.0MB

  • Sample

    240415-wlwtbacf67

  • MD5

    f1a7d1243c170f040a655b081ce3e25e

  • SHA1

    4ee954b1493386484d03c5d258b5c9cca92cae3e

  • SHA256

    9943a84de39c75068f4e947619c9a188274288f058b0e5823382830db1d0c1a9

  • SHA512

    2b607aa0c5f81c1096415a1ee9a93d865e2e4b29d78ef94efeb27e391ed4c4170c6cab21aff8dc9234a72c6627c9cbd2037d56724191187f368ae5217ca89050

  • SSDEEP

    98304:ofemcneoBNiiXrDxp59rSsD++SWt0l4P2RzuKMjNV5R6T6BAuI9nBgB6kMrBpSkf:oQnLRXfTHbHhOK2k/r6T6B0u6LBs8

Malware Config

Targets

    • Target

      f1a7d1243c170f040a655b081ce3e25e_JaffaCakes118

    • Size

      7.0MB

    • MD5

      f1a7d1243c170f040a655b081ce3e25e

    • SHA1

      4ee954b1493386484d03c5d258b5c9cca92cae3e

    • SHA256

      9943a84de39c75068f4e947619c9a188274288f058b0e5823382830db1d0c1a9

    • SHA512

      2b607aa0c5f81c1096415a1ee9a93d865e2e4b29d78ef94efeb27e391ed4c4170c6cab21aff8dc9234a72c6627c9cbd2037d56724191187f368ae5217ca89050

    • SSDEEP

      98304:ofemcneoBNiiXrDxp59rSsD++SWt0l4P2RzuKMjNV5R6T6BAuI9nBgB6kMrBpSkf:oQnLRXfTHbHhOK2k/r6T6B0u6LBs8

    Score
    7/10
    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device.

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection.

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks