General

  • Target

    644b9873628118d35cb3263cd7b0c9d4_JaffaCakes118

  • Size

    5.4MB

  • Sample

    240521-w1gmyaeb4w

  • MD5

    644b9873628118d35cb3263cd7b0c9d4

  • SHA1

    97e4153596e65f6b511d2ed976eb68b842251461

  • SHA256

    38657f51bd4714522d14721c872ff78151c76e8f8d30ec0a860e7a66fc2f2fb5

  • SHA512

    20f09c2cd91295b87862e90c9eccf2e5cdf42c71616eca1cf389cd8b190599269576720b94ffcf9b9d79e6c5e92533487e987acb8c46ab71884ffc9269f9b636

  • SSDEEP

    98304:5GAKVIJ/QAydYASwrETYKfxuq3vHZ624VP0npr5+nrWGjkw4NyzFvGYUzWxtbpdI:57QLdYKkz3vHdLpr5RGjeNyxVG0b7Q7x

Malware Config

Targets

    • Target

      644b9873628118d35cb3263cd7b0c9d4_JaffaCakes118

    • Size

      5.4MB

    • MD5

      644b9873628118d35cb3263cd7b0c9d4

    • SHA1

      97e4153596e65f6b511d2ed976eb68b842251461

    • SHA256

      38657f51bd4714522d14721c872ff78151c76e8f8d30ec0a860e7a66fc2f2fb5

    • SHA512

      20f09c2cd91295b87862e90c9eccf2e5cdf42c71616eca1cf389cd8b190599269576720b94ffcf9b9d79e6c5e92533487e987acb8c46ab71884ffc9269f9b636

    • SSDEEP

      98304:5GAKVIJ/QAydYASwrETYKfxuq3vHZ624VP0npr5+nrWGjkw4NyzFvGYUzWxtbpdI:57QLdYKkz3vHdLpr5RGjeNyxVG0b7Q7x

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the phone number (MSISDN for GSM devices)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Target

      core.jar

    • Size

      442KB

    • MD5

      f84ba6f0daba937e6d435442c99e8387

    • SHA1

      038c9ca9c9ed1c3321bf7fa641975be25fd2241c

    • SHA256

      428827b1d99667c2608ac1c8708b9e3c87018134c1e640b1990cd73adbb77088

    • SHA512

      9a8091c2cd339187341868c4f7ac473852c9cff788d53e6148f99e3093ff6129155cdf985be556dfee4d58b1eb9ca39093fe82bc04d3fab147534dd47781a50f

    • SSDEEP

      12288:uL5KMOiBt1m0FobBKUnJaVS5aNOVWtKVFJj6yHFDqH/H:uVKMdFobBKUnJaVS5jWtqJekc/H

    Score
    1/10
    • Target

      res.bin

    • Size

      205KB

    • MD5

      dafb7d4b90ea8d376128c625183dd9ad

    • SHA1

      883c9b0586e740e9fb976d27a437e84fc26e92fd

    • SHA256

      07be7e035e50b372d700b7cc148515a26b0775b2b485e50895988753fe24b12b

    • SHA512

      56deefb30f358f2d404c93725f331374f0878b8121d95412ab1b1299364b2eea2b7fe179e21bbe96f4076300556a09f55825118ff67b401504c2f3b82af6b13b

    • SSDEEP

      3072:jFsFh83XDWxVFkPRLccq5sOwglfnhdQkWVsXQp6D9PhTbnEaxEiQWu6vSP:jFrzWlkKcqiglfnrXDRFnEaxxaP

    Score
    1/10
    • Target

      update.jar

    • Size

      6KB

    • MD5

      3eea0fcda4a513b99cedf31c7452aaf8

    • SHA1

      071da147eacf17f1c10fc6362ac43839ee96d5a2

    • SHA256

      2a9b79160a4eae5fea2e7fbd3e0498eae8af9d0e8d784b18ac81c3468da6e0a6

    • SHA512

      12a20677a8f36778ceeead1e35a9a20dce8ecc9999803db2e3e40312b74847ccc9efbc649b4949dae38520287b7a01bd50c81dbf9fe1db8fb7e9ecd070801880

    • SSDEEP

      96:G2sO+8hQev6LJugBsw4+KqRdK44JO6kwR7VXChi6nnf6ilCVhRsjgojXFrXyF972:lsONVQJ6p+ZRg7Td1offlqujv671U

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks