General

  • Target

    6392ea4cfc5460bf6b86c4a372354215_JaffaCakes118

  • Size

    9.3MB

  • Sample

    240521-rjkaaagg8t

  • MD5

    6392ea4cfc5460bf6b86c4a372354215

  • SHA1

    d70c5237fc383873db92de5d17a7c231f11b5710

  • SHA256

    449af34112cc35b73970e2e5a9abe4292dd66ab689df7eb9ead47bd40d038361

  • SHA512

    2646e670680c311e08682f500dfedd9c98f307a0666b7f4ab9c4a5fa2fe0957e4742eb15ebf7ab8a3b3017d5d0c60d64339813e3627328ea71fea281c7031009

  • SSDEEP

    196608:8NcbO3U3rYeP88P1v98ohi0hZd5vNSFLGqnqPYFlMrctDVTASXQnWLWYAFmQkU:8Ncbiy93i0LVSFGqnGYMctDVcSXQWqZl

Malware Config

Targets

    • Target

      6392ea4cfc5460bf6b86c4a372354215_JaffaCakes118

    • Size

      9.3MB

    • MD5

      6392ea4cfc5460bf6b86c4a372354215

    • SHA1

      d70c5237fc383873db92de5d17a7c231f11b5710

    • SHA256

      449af34112cc35b73970e2e5a9abe4292dd66ab689df7eb9ead47bd40d038361

    • SHA512

      2646e670680c311e08682f500dfedd9c98f307a0666b7f4ab9c4a5fa2fe0957e4742eb15ebf7ab8a3b3017d5d0c60d64339813e3627328ea71fea281c7031009

    • SSDEEP

      196608:8NcbO3U3rYeP88P1v98ohi0hZd5vNSFLGqnqPYFlMrctDVTASXQnWLWYAFmQkU:8Ncbiy93i0LVSFGqnGYMctDVcSXQWqZl

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the phone number (MSISDN for GSM devices)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks