General

  • Target

    686d83aa9f5cec17daa52a4417882a0c_JaffaCakes118

  • Size

    15.4MB

  • Sample

    240522-ynzzvsec9x

  • MD5

    686d83aa9f5cec17daa52a4417882a0c

  • SHA1

    0525b609f86e209cf70737bd04eb2088f3c40263

  • SHA256

    6b952c801bb08ec236214a30d78dfeb235d92f7930e9a91bf8e76c3171be38a0

  • SHA512

    a91e14f139d3422c6a679a742c2448b0a57e51aa7cab711ffd9b9e813ac975e63d8052dc72b42875866bbfd7ac6fadb27b5e6e96ac21debb31c76f67cda16dde

  • SSDEEP

    393216:NX4xNzFgD5+46rjznplD6BHhpXeUo6Xuw05OIw:NkNBgDoTjznOBHTXe15OP

Malware Config

Targets

    • Target

      686d83aa9f5cec17daa52a4417882a0c_JaffaCakes118

    • Size

      15.4MB

    • MD5

      686d83aa9f5cec17daa52a4417882a0c

    • SHA1

      0525b609f86e209cf70737bd04eb2088f3c40263

    • SHA256

      6b952c801bb08ec236214a30d78dfeb235d92f7930e9a91bf8e76c3171be38a0

    • SHA512

      a91e14f139d3422c6a679a742c2448b0a57e51aa7cab711ffd9b9e813ac975e63d8052dc72b42875866bbfd7ac6fadb27b5e6e96ac21debb31c76f67cda16dde

    • SSDEEP

      393216:NX4xNzFgD5+46rjznplD6BHhpXeUo6Xuw05OIw:NkNBgDoTjznOBHTXe15OP

    • Checks if the Android device is rooted.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks