General

  • Target

    6a5f308b5e9d96c442e950e16b8a54fd_JaffaCakes118

  • Size

    5.2MB

  • Sample

    240523-klrc2sba9t

  • MD5

    6a5f308b5e9d96c442e950e16b8a54fd

  • SHA1

    b476c1ba304c0a747e6697251de54f218975797c

  • SHA256

    281a6ab22f4a1c58c9ce58d5f9c54429acc05414723e6b050ebbebed8c4f48b0

  • SHA512

    b36ebc7ae0d17f8cefe1499f25edd1b28c8baea6d41acc27a77b2baabfe18417a4edcb7648c024b84e7347cdf0605b04032bc565fd68e781ac31d2367246ffda

  • SSDEEP

    98304:a0IuYK5w9uH3bOieCi7hvdkEptY+q5gBF58xrS0d0yzgaPo:aDunw9+Uhvmw2OCo

Malware Config

Targets

    • Target

      6a5f308b5e9d96c442e950e16b8a54fd_JaffaCakes118

    • Size

      5.2MB

    • MD5

      6a5f308b5e9d96c442e950e16b8a54fd

    • SHA1

      b476c1ba304c0a747e6697251de54f218975797c

    • SHA256

      281a6ab22f4a1c58c9ce58d5f9c54429acc05414723e6b050ebbebed8c4f48b0

    • SHA512

      b36ebc7ae0d17f8cefe1499f25edd1b28c8baea6d41acc27a77b2baabfe18417a4edcb7648c024b84e7347cdf0605b04032bc565fd68e781ac31d2367246ffda

    • SSDEEP

      98304:a0IuYK5w9uH3bOieCi7hvdkEptY+q5gBF58xrS0d0yzgaPo:aDunw9+Uhvmw2OCo

    • Checks Android system properties for emulator presence.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks