General

  • Target

    69066badc7ae34f00ecd788248cdd194_JaffaCakes118

  • Size

    17.2MB

  • Sample

    240522-3nxa7ade63

  • MD5

    69066badc7ae34f00ecd788248cdd194

  • SHA1

    1df21ff8ee5463afdeaf07a5fd076b4bafc02332

  • SHA256

    c4c8fa94abd00d21983eb319e42b372db12530dec3dda4bf4157291728eef3e4

  • SHA512

    a43fad1f22e304c3989e5e6b176e1eb7385203da2c0c1a4d27d95406f93a97dda2c87f97022789f9be440e860f04b522a4f5cc4bba85d96eb0059981c55ac680

  • SSDEEP

    393216:M1MRLYFy9X3jytQiyR/mVXGJLcZdXy/uj6FfQ3et/phygDC7F10qjT:OMKA9XTQQpuVWGdC7+Ot/phyg61hT

Malware Config

Targets

    • Target

      69066badc7ae34f00ecd788248cdd194_JaffaCakes118

    • Size

      17.2MB

    • MD5

      69066badc7ae34f00ecd788248cdd194

    • SHA1

      1df21ff8ee5463afdeaf07a5fd076b4bafc02332

    • SHA256

      c4c8fa94abd00d21983eb319e42b372db12530dec3dda4bf4157291728eef3e4

    • SHA512

      a43fad1f22e304c3989e5e6b176e1eb7385203da2c0c1a4d27d95406f93a97dda2c87f97022789f9be440e860f04b522a4f5cc4bba85d96eb0059981c55ac680

    • SSDEEP

      393216:M1MRLYFy9X3jytQiyR/mVXGJLcZdXy/uj6FfQ3et/phygDC7F10qjT:OMKA9XTQQpuVWGdC7+Ot/phyg61hT

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Matrix

Tasks