General

  • Target

    69bb28f1a2167e4583477f82b3f7f428_JaffaCakes118

  • Size

    14.2MB

  • Sample

    240523-e6gfpaea43

  • MD5

    69bb28f1a2167e4583477f82b3f7f428

  • SHA1

    1bb32155d5c45afdf8102bfcd6ccd3545704cf19

  • SHA256

    1c4b4b94bcdfdebdbaa722871243d96a9e5baa37755e60083fc57f7fc36ce02d

  • SHA512

    7c6861f2311c5b1b761b323a8fce24e252bf09f774e27188922698457ff8fbbccbebf667dbbc835f566e4713fc48e28a519a69efdd994a6c5e3a4c6ca97dd69d

  • SSDEEP

    393216:9+yOxqaHNi3cPwYJr5GYCsbgJ8gecZd/b0ebmYWrYhB7:UHA3cYorIFwebR+Kd

Malware Config

Targets

    • Target

      69bb28f1a2167e4583477f82b3f7f428_JaffaCakes118

    • Size

      14.2MB

    • MD5

      69bb28f1a2167e4583477f82b3f7f428

    • SHA1

      1bb32155d5c45afdf8102bfcd6ccd3545704cf19

    • SHA256

      1c4b4b94bcdfdebdbaa722871243d96a9e5baa37755e60083fc57f7fc36ce02d

    • SHA512

      7c6861f2311c5b1b761b323a8fce24e252bf09f774e27188922698457ff8fbbccbebf667dbbc835f566e4713fc48e28a519a69efdd994a6c5e3a4c6ca97dd69d

    • SSDEEP

      393216:9+yOxqaHNi3cPwYJr5GYCsbgJ8gecZd/b0ebmYWrYhB7:UHA3cYorIFwebR+Kd

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks