General

  • Target

    63e9ed746c8c4f3c0f0f3c90a8a94066_JaffaCakes118

  • Size

    22.9MB

  • Sample

    240521-tm6zkabe3w

  • MD5

    63e9ed746c8c4f3c0f0f3c90a8a94066

  • SHA1

    da119061611c8d23edab1c15c1535bfd34179818

  • SHA256

    953d3071146070767b72efc075da71b4abcb282bae2d411770d712f910f94158

  • SHA512

    ca7d23bb89dbe85286322ca14db39a5fe0f20ceabac086b72db784c82590e638317893361549a2a491b8835318335d99ad72c04e4de705b28affa359e2d353d0

  • SSDEEP

    393216:WfV9RFHMbej1zP4nVOXdSMGMJc6RQeqe8GpeetDkDI2k4obDf4K1Y/isZ:UtFsSj1DK8NSMGyR9qe8olCSb8K1Y/ic

Malware Config

Targets

    • Target

      63e9ed746c8c4f3c0f0f3c90a8a94066_JaffaCakes118

    • Size

      22.9MB

    • MD5

      63e9ed746c8c4f3c0f0f3c90a8a94066

    • SHA1

      da119061611c8d23edab1c15c1535bfd34179818

    • SHA256

      953d3071146070767b72efc075da71b4abcb282bae2d411770d712f910f94158

    • SHA512

      ca7d23bb89dbe85286322ca14db39a5fe0f20ceabac086b72db784c82590e638317893361549a2a491b8835318335d99ad72c04e4de705b28affa359e2d353d0

    • SSDEEP

      393216:WfV9RFHMbej1zP4nVOXdSMGMJc6RQeqe8GpeetDkDI2k4obDf4K1Y/isZ:UtFsSj1DK8NSMGyR9qe8olCSb8K1Y/ic

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks