General

  • Target

    658bc88006c62fc22c73a65b11a8259c_JaffaCakes118

  • Size

    29.4MB

  • Sample

    240522-b1j3vagb86

  • MD5

    658bc88006c62fc22c73a65b11a8259c

  • SHA1

    4b447808b4f54f289a0f9e79d0c31190dc83c55a

  • SHA256

    b581b283b7f1c54e27a00bfa10478ed5e51bd941fe08d0da2964652cbd29f57c

  • SHA512

    0b407c333a3a1f1aec9c05fc971580c06b93cc818a7fd1a1c15ec9b2b14febfab7c7d720a94ff7436d80f447b0cdae87e36b35703c9f07b353f8390ac90870bd

  • SSDEEP

    786432:uYpy4FqAAC8HjYaB9AwG4hi0Fmsh8OHJ6mhlaOXBllzt:bpyoUjl9A74histBhMullzt

Malware Config

Targets

    • Target

      658bc88006c62fc22c73a65b11a8259c_JaffaCakes118

    • Size

      29.4MB

    • MD5

      658bc88006c62fc22c73a65b11a8259c

    • SHA1

      4b447808b4f54f289a0f9e79d0c31190dc83c55a

    • SHA256

      b581b283b7f1c54e27a00bfa10478ed5e51bd941fe08d0da2964652cbd29f57c

    • SHA512

      0b407c333a3a1f1aec9c05fc971580c06b93cc818a7fd1a1c15ec9b2b14febfab7c7d720a94ff7436d80f447b0cdae87e36b35703c9f07b353f8390ac90870bd

    • SSDEEP

      786432:uYpy4FqAAC8HjYaB9AwG4hi0Fmsh8OHJ6mhlaOXBllzt:bpyoUjl9A74histBhMullzt

    • Checks if the Android device is rooted.

    • Checks Android system properties for emulator presence.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks Qemu related system properties.

      Checks for Android system properties related to Qemu for Emulator detection.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Target

      mimo_asset.apk

    • Size

      300KB

    • MD5

      b3bc6255feea6cd9398fa0cc9da7a88d

    • SHA1

      85924ff9afd7531e191367a1c1c086829161fa19

    • SHA256

      8de83f61dbba332ba95cdeefea24114adc08f483b45398a53bf06f5608e4d65e

    • SHA512

      0020ec00005ac5127d9425dea6713980881d33b72c767c42d0237fad5cf403c751a6d8d153ce6b4286e227042b36c0909e2a7af55b635963193e6cc99e78a644

    • SSDEEP

      6144:9ZuHNuP4S37gQ3HSBSZGFbtxTPgVpqzjDPNHcPLwyU8wgKZ/sCtYte:ewPD73HyVL0VpqzjrhW35KdJYte

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks