General

  • Target

    5321a636ce29a5e3a53a8a84e5a210c9_JaffaCakes118

  • Size

    5.3MB

  • Sample

    240518-fn3fwach8y

  • MD5

    5321a636ce29a5e3a53a8a84e5a210c9

  • SHA1

    c5e34a992b10c48b8197c9fb505739130c846601

  • SHA256

    38910e5632f66888d81f07c8be152b26119382ac61a1da3a5a69ff52da1b4d37

  • SHA512

    7c27a73ca5f6d6046ce46b11fea052aa0ab751f587d51dfdfc941030d1161284861834da58b7afb78ac1b3915adccff9ae44f7163f0e8b8222e6a8726de4bc96

  • SSDEEP

    98304:6anL87MoC+LWWd9DrF/d8KSZ4rrVpSwmIeYyUjYc5UU8Oek1l/SjL0Be:64LmMob9DrFhrrVpSFIeYMcaUDeWa3Ye

Malware Config

Targets

    • Target

      5321a636ce29a5e3a53a8a84e5a210c9_JaffaCakes118

    • Size

      5.3MB

    • MD5

      5321a636ce29a5e3a53a8a84e5a210c9

    • SHA1

      c5e34a992b10c48b8197c9fb505739130c846601

    • SHA256

      38910e5632f66888d81f07c8be152b26119382ac61a1da3a5a69ff52da1b4d37

    • SHA512

      7c27a73ca5f6d6046ce46b11fea052aa0ab751f587d51dfdfc941030d1161284861834da58b7afb78ac1b3915adccff9ae44f7163f0e8b8222e6a8726de4bc96

    • SSDEEP

      98304:6anL87MoC+LWWd9DrF/d8KSZ4rrVpSwmIeYyUjYc5UU8Oek1l/SjL0Be:64LmMob9DrFhrrVpSFIeYMcaUDeWa3Ye

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks