General

  • Target

    647b521e30acd21b152b88df9934176b_JaffaCakes118

  • Size

    27.5MB

  • Sample

    240521-x55q1afh66

  • MD5

    647b521e30acd21b152b88df9934176b

  • SHA1

    f42b449648f04919199baf9b387f52e1912af692

  • SHA256

    a09ce8b6e4ef42167117746502cd2a49e1f103f448a15d3e180a45d1c328ff9e

  • SHA512

    aba90f02b36696dd44f52e12b6037919d6ca6debf11be068b8271d461885c29750b28e470881ef7699d1895642ab069acda26b6c829d37bec61083ebe17a0108

  • SSDEEP

    786432:uwxJvyhvdTNNkcZ9HMbPtcv6um8Xuqw2jaHpXN/lyXQ:uwvyrTHQb1ci/8X+2YNlyXQ

Malware Config

Targets

    • Target

      647b521e30acd21b152b88df9934176b_JaffaCakes118

    • Size

      27.5MB

    • MD5

      647b521e30acd21b152b88df9934176b

    • SHA1

      f42b449648f04919199baf9b387f52e1912af692

    • SHA256

      a09ce8b6e4ef42167117746502cd2a49e1f103f448a15d3e180a45d1c328ff9e

    • SHA512

      aba90f02b36696dd44f52e12b6037919d6ca6debf11be068b8271d461885c29750b28e470881ef7699d1895642ab069acda26b6c829d37bec61083ebe17a0108

    • SSDEEP

      786432:uwxJvyhvdTNNkcZ9HMbPtcv6um8Xuqw2jaHpXN/lyXQ:uwvyrTHQb1ci/8X+2YNlyXQ

    • Checks if the Android device is rooted.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks