General

  • Target

    658732209be1e4caa0cb665d565634c7_JaffaCakes118

  • Size

    12.5MB

  • Sample

    240522-bwqd3aga67

  • MD5

    658732209be1e4caa0cb665d565634c7

  • SHA1

    fb1b035e193a72948cbd39809956914e87ae630d

  • SHA256

    436235cd3bbe71e25bd091b284108efa40ae6dfae440c734072df2c9ed980b6a

  • SHA512

    ebddad57dbcb475993d94dc72dfd80cd1f93f49079fb0d85752e902c6e59d91449dcc3fde3167388c393bb3eed667d7f14ed2bbefe951945fcaa9189c8157e61

  • SSDEEP

    393216:ugkayoeUsZBiqs0Onl+PKhsEWJP6XgWVcfa:TkaDelIDl+PIsXZUcfa

Malware Config

Targets

    • Target

      658732209be1e4caa0cb665d565634c7_JaffaCakes118

    • Size

      12.5MB

    • MD5

      658732209be1e4caa0cb665d565634c7

    • SHA1

      fb1b035e193a72948cbd39809956914e87ae630d

    • SHA256

      436235cd3bbe71e25bd091b284108efa40ae6dfae440c734072df2c9ed980b6a

    • SHA512

      ebddad57dbcb475993d94dc72dfd80cd1f93f49079fb0d85752e902c6e59d91449dcc3fde3167388c393bb3eed667d7f14ed2bbefe951945fcaa9189c8157e61

    • SSDEEP

      393216:ugkayoeUsZBiqs0Onl+PKhsEWJP6XgWVcfa:TkaDelIDl+PIsXZUcfa

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks