General

  • Target

    4870b47ea45399e6f0cf43b90cb6c476_JaffaCakes118

  • Size

    18.0MB

  • Sample

    240515-2ydq6agg69

  • MD5

    4870b47ea45399e6f0cf43b90cb6c476

  • SHA1

    979b8485dee91e1c1bddb82d39b324099490625d

  • SHA256

    25553e71cb02639488b4ab709b6ce50601c5f64042c44c3218369d3d197f09ad

  • SHA512

    444b195a8f749bfe8f58eb1f93d0755ee6496a1ed7eb48a3de6de8a21df7a069a59011d82b9e2cdf15a725f424f996d0bfd647f2a6923a3fd1f153664fc58792

  • SSDEEP

    393216:+NKMf1mAplwBcHUcd+r2tF9Ya3g7gf/dgSRYe3uf:+NKMf0ApyqHLF9Twc2SWeK

Malware Config

Targets

    • Target

      4870b47ea45399e6f0cf43b90cb6c476_JaffaCakes118

    • Size

      18.0MB

    • MD5

      4870b47ea45399e6f0cf43b90cb6c476

    • SHA1

      979b8485dee91e1c1bddb82d39b324099490625d

    • SHA256

      25553e71cb02639488b4ab709b6ce50601c5f64042c44c3218369d3d197f09ad

    • SHA512

      444b195a8f749bfe8f58eb1f93d0755ee6496a1ed7eb48a3de6de8a21df7a069a59011d82b9e2cdf15a725f424f996d0bfd647f2a6923a3fd1f153664fc58792

    • SSDEEP

      393216:+NKMf1mAplwBcHUcd+r2tF9Ya3g7gf/dgSRYe3uf:+NKMf0ApyqHLF9Twc2SWeK

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks