General

  • Target

    5cb9efd6353cc7be470364c79ed5e40c_JaffaCakes118

  • Size

    602KB

  • Sample

    240520-cyhmnsgb3s

  • MD5

    5cb9efd6353cc7be470364c79ed5e40c

  • SHA1

    e25edb85613ec9eb997a2b19ec6e0b21626cee69

  • SHA256

    136c126e5946181bdf194d219b882c9d2363c9952ec3e6ba8e0b7823e838a5f6

  • SHA512

    0c12a8b266a15c49888f5b92ac137ef28fb6c3077614bcb9b70c7662de8de25b607143a570cc572ca83ccd240268b289560fd71099f2350d5d23d1e5b63a3313

  • SSDEEP

    12288:XEEaFZvkGGNUuWW1NVwCKn6GAx1d9H1BY+0aTBpqSol2KpEhpX79l:UEaFmFN9v46flH72wOSoMK69l

Malware Config

Targets

    • Target

      5cb9efd6353cc7be470364c79ed5e40c_JaffaCakes118

    • Size

      602KB

    • MD5

      5cb9efd6353cc7be470364c79ed5e40c

    • SHA1

      e25edb85613ec9eb997a2b19ec6e0b21626cee69

    • SHA256

      136c126e5946181bdf194d219b882c9d2363c9952ec3e6ba8e0b7823e838a5f6

    • SHA512

      0c12a8b266a15c49888f5b92ac137ef28fb6c3077614bcb9b70c7662de8de25b607143a570cc572ca83ccd240268b289560fd71099f2350d5d23d1e5b63a3313

    • SSDEEP

      12288:XEEaFZvkGGNUuWW1NVwCKn6GAx1d9H1BY+0aTBpqSol2KpEhpX79l:UEaFmFN9v46flH72wOSoMK69l

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Removes its main activity from the application launcher

    • Checks Android system properties for emulator presence.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Matrix

Tasks