General

  • Target

    286a9064f10e3589f72e0468a2ad38b5_JaffaCakes118

  • Size

    31.8MB

  • Sample

    240509-fqlk5sfa66

  • MD5

    286a9064f10e3589f72e0468a2ad38b5

  • SHA1

    dd301ba6789fbbee84538d2c51e9e1de2d80913b

  • SHA256

    b1d79924ac8f20c0c959c272c8af729725597c3464ce914bda35d7ea3f797874

  • SHA512

    4dfa0f891bc88d342c37dcdae947e63391b4c22e1604e7e3de9f2fbfa6e903e7631af5ca7e4cb08c029b9e8a550fd684c3ffab30c547c3bdd8104da893c996db

  • SSDEEP

    786432:UIS/CD/fwUHoFBa2zbzgf8rT9UKiJ03lwLCDJEq02v7GWA5Z0H:bnD3wRBa2zbi8rBUKYwwLmC2v71

Malware Config

Targets

    • Target

      286a9064f10e3589f72e0468a2ad38b5_JaffaCakes118

    • Size

      31.8MB

    • MD5

      286a9064f10e3589f72e0468a2ad38b5

    • SHA1

      dd301ba6789fbbee84538d2c51e9e1de2d80913b

    • SHA256

      b1d79924ac8f20c0c959c272c8af729725597c3464ce914bda35d7ea3f797874

    • SHA512

      4dfa0f891bc88d342c37dcdae947e63391b4c22e1604e7e3de9f2fbfa6e903e7631af5ca7e4cb08c029b9e8a550fd684c3ffab30c547c3bdd8104da893c996db

    • SSDEEP

      786432:UIS/CD/fwUHoFBa2zbzgf8rT9UKiJ03lwLCDJEq02v7GWA5Z0H:bnD3wRBa2zbi8rBUKYwwLmC2v71

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Target

      bdxadsdk.jar

    • Size

      85KB

    • MD5

      33d29faa7d49af349942a7005f7c19d5

    • SHA1

      a80e3ec3ce3b7a7a561b0c37642e9a33700d6a38

    • SHA256

      0c51612ef512f40890a61bb43a82d75be042bb81e777256ce65434dafe0a8d12

    • SHA512

      0095beb08d9de9bf53e22b5e19492c3b2dac97d35667c9b7d1740d188c816dbcb32d9eb28a49e0f1e5c0ec546d7e448e2471852fc716fd1a3107d05d9bea67e2

    • SSDEEP

      1536:Svc+ZnAgFdQZNkbxjvVqepTNioTYX0ZNCou5yvZWvOcrR0ps/nwXlS3oMlAz3SIB:S9zkZ2NqepTNlPooKOcr2pFVMkC8

    Score
    1/10
    • Target

      gdtadv2.jar

    • Size

      149KB

    • MD5

      5bbd4987057c6aa8f1992d72206c68a9

    • SHA1

      3a2b6dae68dce8239f680c2684c648238bc1bf36

    • SHA256

      2a7fea6e019debe6a0b0c8a5bff40a0451133d3f122d3bcb8f28aed615c50539

    • SHA512

      ec138779d809f32ffe54998314263546f630fef799bb3cbf61fd494706724a3f756e0b3a5e721765b121a053b56cbe3e39f8edd09c17cae8289d677f9c4b8f73

    • SSDEEP

      3072:s9ECghK7Pic1Oy3c/obh2acQZD8+jb1gUKno8+l7kSVi:sig7KijlbhncQ58CCUKolkSM

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks