General

  • Target

    6a592437092dd4f89a94e334c0221c35_JaffaCakes118

  • Size

    9.3MB

  • Sample

    240523-ken94sah2v

  • MD5

    6a592437092dd4f89a94e334c0221c35

  • SHA1

    900cb99618aa32d629d1daf045307490e58f1aac

  • SHA256

    db56d6a70a6be2b40372a9f26e80bb068147333d5707f5a7998376336e6928d7

  • SHA512

    3f0eeaa4e24a7db82f38ebce38136ac14ae91a3f9b3b37be76dfc0c992c7ff3c0897d4bb9295d921dfc9e73978803b637b53c7c6153a01af028b2aff30eb71dc

  • SSDEEP

    196608:OW3LkXd6vX9pGx//JCsJWdyJ/JldbQGTGEkaEFp8:OsLkt6//GxDWMflyGaEkaE4

Malware Config

Targets

    • Target

      6a592437092dd4f89a94e334c0221c35_JaffaCakes118

    • Size

      9.3MB

    • MD5

      6a592437092dd4f89a94e334c0221c35

    • SHA1

      900cb99618aa32d629d1daf045307490e58f1aac

    • SHA256

      db56d6a70a6be2b40372a9f26e80bb068147333d5707f5a7998376336e6928d7

    • SHA512

      3f0eeaa4e24a7db82f38ebce38136ac14ae91a3f9b3b37be76dfc0c992c7ff3c0897d4bb9295d921dfc9e73978803b637b53c7c6153a01af028b2aff30eb71dc

    • SSDEEP

      196608:OW3LkXd6vX9pGx//JCsJWdyJ/JldbQGTGEkaEFp8:OsLkt6//GxDWMflyGaEkaE4

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks