General

  • Target

    664763cd12de8a050fca787a6dfb4427_JaffaCakes118

  • Size

    19.6MB

  • Sample

    240522-gzqrwseg81

  • MD5

    664763cd12de8a050fca787a6dfb4427

  • SHA1

    de553833d6600b0a70a24beefe7f66d404567602

  • SHA256

    e394d90d7ba4cdbdb212a1c5bcd83703fc7243cf29aded533f2ee3bd31a58bd6

  • SHA512

    26f51e1bf6be6f1080a92c802f541eb8027564903f4285ca18212b4cd2167be8ed963f71629773bcae107369ec7ed6d597205d09ca1411b349b8d3d0a6df2acd

  • SSDEEP

    393216:l/noLQITECFhQ8iPyr+FNGjvxotGRdfhSIyk4gJ5yLGEsevbCBzbutgWpjX3iFMy:VnoLrT9F6bN2ZPdfF74gOLGEsevbCBzx

Malware Config

Targets

    • Target

      664763cd12de8a050fca787a6dfb4427_JaffaCakes118

    • Size

      19.6MB

    • MD5

      664763cd12de8a050fca787a6dfb4427

    • SHA1

      de553833d6600b0a70a24beefe7f66d404567602

    • SHA256

      e394d90d7ba4cdbdb212a1c5bcd83703fc7243cf29aded533f2ee3bd31a58bd6

    • SHA512

      26f51e1bf6be6f1080a92c802f541eb8027564903f4285ca18212b4cd2167be8ed963f71629773bcae107369ec7ed6d597205d09ca1411b349b8d3d0a6df2acd

    • SSDEEP

      393216:l/noLQITECFhQ8iPyr+FNGjvxotGRdfhSIyk4gJ5yLGEsevbCBzbutgWpjX3iFMy:VnoLrT9F6bN2ZPdfF74gOLGEsevbCBzx

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads the content of photos stored on the user's device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Checks the presence of a debugger

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks