General

  • Target

    666fdf3b2ed8961d2afe7383abe9c70e_JaffaCakes118

  • Size

    4.8MB

  • Sample

    240522-h2rbwaga7w

  • MD5

    666fdf3b2ed8961d2afe7383abe9c70e

  • SHA1

    14998548542d5ef37c8e98d68236ae9dff4290eb

  • SHA256

    7d9f35f5769f420a61c9415dd2e6289c2ef11f6f8db302e0e18f9fdb89fc3014

  • SHA512

    656c2b90bec2e4818b802faaae0fec3e850d91d787a16bcaccf81dcada513912267261b1fbca81e1953603fa470175b0e2d80df74179839c2c2cb3626a6c3d8a

  • SSDEEP

    98304:lx7yHlER3JE8E2j+pVydaMwafNH8vzNyh3ReiHyAJRVU:lOJPGdSUd8QhB6AJRe

Malware Config

Targets

    • Target

      666fdf3b2ed8961d2afe7383abe9c70e_JaffaCakes118

    • Size

      4.8MB

    • MD5

      666fdf3b2ed8961d2afe7383abe9c70e

    • SHA1

      14998548542d5ef37c8e98d68236ae9dff4290eb

    • SHA256

      7d9f35f5769f420a61c9415dd2e6289c2ef11f6f8db302e0e18f9fdb89fc3014

    • SHA512

      656c2b90bec2e4818b802faaae0fec3e850d91d787a16bcaccf81dcada513912267261b1fbca81e1953603fa470175b0e2d80df74179839c2c2cb3626a6c3d8a

    • SSDEEP

      98304:lx7yHlER3JE8E2j+pVydaMwafNH8vzNyh3ReiHyAJRVU:lOJPGdSUd8QhB6AJRe

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the phone number (MSISDN for GSM devices)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks