General

  • Target

    6925c16da553756c86b2b5bb3db4d39e_JaffaCakes118

  • Size

    16.7MB

  • Sample

    240523-atkv5aeg6v

  • MD5

    6925c16da553756c86b2b5bb3db4d39e

  • SHA1

    8909f1f84220bc9cdae8064c727444e74664d5c7

  • SHA256

    d29b13bdc141734105e94bc2f5f12082a3ff1fed21701c5fdb5e1637a7672ac3

  • SHA512

    de9984c9f2cbf64f5c0f9a2e4db30614679fc37ced4b2703573b69656c83a6d86e2cca67fbbb3e09cef6b97feb23a579ccc9d56f5ce9fcfee3753e00101e3c9b

  • SSDEEP

    393216:RjIxaDCZEBoLxkNPmvcWo4Foyu2tlcBku1awFgfvO:RMxaDqCP6cWoyDul6+

Malware Config

Targets

    • Target

      6925c16da553756c86b2b5bb3db4d39e_JaffaCakes118

    • Size

      16.7MB

    • MD5

      6925c16da553756c86b2b5bb3db4d39e

    • SHA1

      8909f1f84220bc9cdae8064c727444e74664d5c7

    • SHA256

      d29b13bdc141734105e94bc2f5f12082a3ff1fed21701c5fdb5e1637a7672ac3

    • SHA512

      de9984c9f2cbf64f5c0f9a2e4db30614679fc37ced4b2703573b69656c83a6d86e2cca67fbbb3e09cef6b97feb23a579ccc9d56f5ce9fcfee3753e00101e3c9b

    • SSDEEP

      393216:RjIxaDCZEBoLxkNPmvcWo4Foyu2tlcBku1awFgfvO:RMxaDqCP6cWoyDul6+

    • Checks if the Android device is rooted.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks