General

  • Target

    2bb587f6d96727201442d48cc7f29aa8_JaffaCakes118

  • Size

    24.2MB

  • Sample

    240509-zyj7tsef9s

  • MD5

    2bb587f6d96727201442d48cc7f29aa8

  • SHA1

    a291aafffb86e5365593f1e8c062946f70a2df54

  • SHA256

    d6c9900abeda92780a7ef4d1de32c999afdb8f91f6a09fa426e0297dab6310c3

  • SHA512

    22871b9665bef1ce48dc4e4ae1c99fb1ce6de558e9355ddd13ebcf847a64cb8e893ce8b846cd033082fcda29e9f5818b6c1a59ed026e34311aefdff5e7c10dd2

  • SSDEEP

    393216:022Wn3JM4qzWkxF3z9PA8nlilzVdP7yYUL4WU2LmoGOcTRZJAR2r3xs0adOY:0tEM3WSh9PA8+Xa0LEgB/Ta0adr

Malware Config

Targets

    • Target

      2bb587f6d96727201442d48cc7f29aa8_JaffaCakes118

    • Size

      24.2MB

    • MD5

      2bb587f6d96727201442d48cc7f29aa8

    • SHA1

      a291aafffb86e5365593f1e8c062946f70a2df54

    • SHA256

      d6c9900abeda92780a7ef4d1de32c999afdb8f91f6a09fa426e0297dab6310c3

    • SHA512

      22871b9665bef1ce48dc4e4ae1c99fb1ce6de558e9355ddd13ebcf847a64cb8e893ce8b846cd033082fcda29e9f5818b6c1a59ed026e34311aefdff5e7c10dd2

    • SSDEEP

      393216:022Wn3JM4qzWkxF3z9PA8nlilzVdP7yYUL4WU2LmoGOcTRZJAR2r3xs0adOY:0tEM3WSh9PA8+Xa0LEgB/Ta0adr

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks