General

  • Target

    560f907dc5cf78266ad3e0e50464dbf8_JaffaCakes118

  • Size

    6.1MB

  • Sample

    240518-wkj35agc32

  • MD5

    560f907dc5cf78266ad3e0e50464dbf8

  • SHA1

    27d98cbf54ac94d86ecfe09219723aeecfbc09b7

  • SHA256

    bb39ac9f93aa822397d7774e9dff23b017361d8a85f6c122c8b72c500abab490

  • SHA512

    b66926fa8ff5dacdca5452a3a8a8d19cc790f4c929c1fffa5d43a17c9b55c52aad84bcb933a6481e1355c84e29d113a2a2db9081a69ff42f5e09fb69ead265f8

  • SSDEEP

    196608:Y9EaTHj10wjisJFN7R8VaUmLgnWWqFo7bMblgfqm/wb+:Y9Ea7R0wJFdeVaxgnqighOm+

Malware Config

Targets

    • Target

      560f907dc5cf78266ad3e0e50464dbf8_JaffaCakes118

    • Size

      6.1MB

    • MD5

      560f907dc5cf78266ad3e0e50464dbf8

    • SHA1

      27d98cbf54ac94d86ecfe09219723aeecfbc09b7

    • SHA256

      bb39ac9f93aa822397d7774e9dff23b017361d8a85f6c122c8b72c500abab490

    • SHA512

      b66926fa8ff5dacdca5452a3a8a8d19cc790f4c929c1fffa5d43a17c9b55c52aad84bcb933a6481e1355c84e29d113a2a2db9081a69ff42f5e09fb69ead265f8

    • SSDEEP

      196608:Y9EaTHj10wjisJFN7R8VaUmLgnWWqFo7bMblgfqm/wb+:Y9Ea7R0wJFdeVaxgnqighOm+

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks