General

  • Target

    65d62b4677d6c5892a3f7ad4d1a80968_JaffaCakes118

  • Size

    15.8MB

  • Sample

    240522-dw4b2aae69

  • MD5

    65d62b4677d6c5892a3f7ad4d1a80968

  • SHA1

    50c7fe6c444da0d5383d206ddef06bc66a1952e3

  • SHA256

    5a8e2df62e7931f08b291aa7869671441a0f28b75e35717f5f8ef5a374195122

  • SHA512

    cfd639cfb8321f3eedb14745835a68075399044980cc13b88d2328c0117e07f92202c9492be79cb74986997dcf36fb829797dafbb4b536c093837fabb21167ed

  • SSDEEP

    393216:178XKMmXKxZa1USQWjKdvvnbVzzljvA3F6J6wkIcYEB3SsZmi8N:17hKemWjKFVzz9vAq6hYEB3SsZmi8N

Malware Config

Targets

    • Target

      65d62b4677d6c5892a3f7ad4d1a80968_JaffaCakes118

    • Size

      15.8MB

    • MD5

      65d62b4677d6c5892a3f7ad4d1a80968

    • SHA1

      50c7fe6c444da0d5383d206ddef06bc66a1952e3

    • SHA256

      5a8e2df62e7931f08b291aa7869671441a0f28b75e35717f5f8ef5a374195122

    • SHA512

      cfd639cfb8321f3eedb14745835a68075399044980cc13b88d2328c0117e07f92202c9492be79cb74986997dcf36fb829797dafbb4b536c093837fabb21167ed

    • SSDEEP

      393216:178XKMmXKxZa1USQWjKdvvnbVzzljvA3F6J6wkIcYEB3SsZmi8N:17hKemWjKFVzz9vAq6hYEB3SsZmi8N

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Target

      plugin-deploy.jar

    • Size

      206KB

    • MD5

      02fe22caeb17a9d7c7f5c3914e3cda29

    • SHA1

      7e3293216263ab967ca6e9a3c55ba589444e3de7

    • SHA256

      0fba8eedb44faf95448ed7e25bcba48b49aa981e1e1e154fcbd90e48447813a4

    • SHA512

      020324dd3b38d6d75fbb54f18caf0bfdff38e27b0c18aa83989b53e9da96a6d6c780f281b21da8f1b41e3de1206306954dc9d1e42aa2dd12f500b66e04f4c647

    • SSDEEP

      6144:QVMQdIey/0Jl8L9umLtnWy6C0mNiEfWBm63:QVMbL/q2nL4g0mNXf7o

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks