General

  • Target

    316b74a3e6ebdbb58e88808e09c01913_JaffaCakes118

  • Size

    31.1MB

  • Sample

    240510-2p3zpaeb5t

  • MD5

    316b74a3e6ebdbb58e88808e09c01913

  • SHA1

    58da780478dca99f3b38e0cf174b2f7a1ed30f4c

  • SHA256

    0633042362df21e55f26f8f593383c2a5885cd39918d86eb157ad8f6ef70c389

  • SHA512

    6fcc07cee9d8c929dd548efbb158e652cc04227473248489dbaaa478ff81c7e235dd283eb4ebc0e531d6e13372e8772830fff96cb6c99f53e5842f3e1dda18e0

  • SSDEEP

    786432:JoncV6EbSCQ0ZqFWxT9VSr43FRbHithar:K98SC0FWxT9VN3Flt

Malware Config

Targets

    • Target

      316b74a3e6ebdbb58e88808e09c01913_JaffaCakes118

    • Size

      31.1MB

    • MD5

      316b74a3e6ebdbb58e88808e09c01913

    • SHA1

      58da780478dca99f3b38e0cf174b2f7a1ed30f4c

    • SHA256

      0633042362df21e55f26f8f593383c2a5885cd39918d86eb157ad8f6ef70c389

    • SHA512

      6fcc07cee9d8c929dd548efbb158e652cc04227473248489dbaaa478ff81c7e235dd283eb4ebc0e531d6e13372e8772830fff96cb6c99f53e5842f3e1dda18e0

    • SSDEEP

      786432:JoncV6EbSCQ0ZqFWxT9VSr43FRbHithar:K98SC0FWxT9VN3Flt

    • Checks Android system properties for emulator presence.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Target

      mimo_asset.apk

    • Size

      390KB

    • MD5

      39692de7ff0848e54bf6ea1ce9ece672

    • SHA1

      bf6299d772f195bac724f738c49cdac0c538abe4

    • SHA256

      011c400d36773b3b475290c2d1af5a829c0597c24dfbb10e12222611a4e1300e

    • SHA512

      3ea7d8e4a85e1b8b7759984f817df7c65656d057e31b11ec1a970e79a99b775fca5e5f8ef942f99869a14b58a91c1a5838b5711ac33f915cf8f7f77280bcadc6

    • SSDEEP

      12288:hNx7RUQtEAQ5YXCA3xfDX2O9THkIMFsTTX5KOk5O:57RUQt35XCA3xz2O9TEJy3XIOkw

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks