General

  • Target

    f67ee2e8f08190bf558a61e3b0f12891_JaffaCakes118

  • Size

    15.2MB

  • Sample

    240417-x35cfsch8z

  • MD5

    f67ee2e8f08190bf558a61e3b0f12891

  • SHA1

    c206b84220958a35251d98b3e275e02d74040d0b

  • SHA256

    dd8ac1c2cdbc72bc1ba84efb3ea207cc9317680a7b05452217d2aa2c60584b12

  • SHA512

    d1b9833a6d4fe8edb608bd69aeaecd1618b198930f55e38c1fa8160b298f44cdbb65f6e73cd40003926b0420199c125b09f75298a306730b991cedb9d98dc1aa

  • SSDEEP

    196608:FTogZC/Zd1ipgZ0nBx/gZDad8MrJ+c4GTYaiHwjMUzD5FuzfJWvUFmmPta6PeycN:Jpe1iuZSjgZsN6GriHiz1FHQDzDc5Khu

Malware Config

Targets

    • Target

      f67ee2e8f08190bf558a61e3b0f12891_JaffaCakes118

    • Size

      15.2MB

    • MD5

      f67ee2e8f08190bf558a61e3b0f12891

    • SHA1

      c206b84220958a35251d98b3e275e02d74040d0b

    • SHA256

      dd8ac1c2cdbc72bc1ba84efb3ea207cc9317680a7b05452217d2aa2c60584b12

    • SHA512

      d1b9833a6d4fe8edb608bd69aeaecd1618b198930f55e38c1fa8160b298f44cdbb65f6e73cd40003926b0420199c125b09f75298a306730b991cedb9d98dc1aa

    • SSDEEP

      196608:FTogZC/Zd1ipgZ0nBx/gZDad8MrJ+c4GTYaiHwjMUzD5FuzfJWvUFmmPta6PeycN:Jpe1iuZSjgZsN6GriHiz1FHQDzDc5Khu

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device.

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection.

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks.

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks