General

  • Target

    6a7c5255f13dc929c096f385ce848a81_JaffaCakes118

  • Size

    21.4MB

  • Sample

    240523-le6ptsca33

  • MD5

    6a7c5255f13dc929c096f385ce848a81

  • SHA1

    903ea534f35656e8843ec1856c2c6b66d83c3431

  • SHA256

    134c8dbfb663eb00e0df968a4f4ee9c362ff68c6a8b9fb6599377083063bb800

  • SHA512

    c042cb9537d626a1fa0791034bbba85730c9442d995d4a31e2422b0286e48598e48f996fe9d9200d2c0044006096fa9cb6c9a5f751321da6960bb139fbcc0d8b

  • SSDEEP

    393216:XQx7hXBkePJ/IKeAuk5StsuBgzmoDzeyyiErh2Tqd/Q9D0QefnHZl3254Wxnr:XW9+wKKe9tqHrydr/Y9IXfnHfaHr

Malware Config

Targets

    • Target

      6a7c5255f13dc929c096f385ce848a81_JaffaCakes118

    • Size

      21.4MB

    • MD5

      6a7c5255f13dc929c096f385ce848a81

    • SHA1

      903ea534f35656e8843ec1856c2c6b66d83c3431

    • SHA256

      134c8dbfb663eb00e0df968a4f4ee9c362ff68c6a8b9fb6599377083063bb800

    • SHA512

      c042cb9537d626a1fa0791034bbba85730c9442d995d4a31e2422b0286e48598e48f996fe9d9200d2c0044006096fa9cb6c9a5f751321da6960bb139fbcc0d8b

    • SSDEEP

      393216:XQx7hXBkePJ/IKeAuk5StsuBgzmoDzeyyiErh2Tqd/Q9D0QefnHZl3254Wxnr:XW9+wKKe9tqHrydr/Y9IXfnHfaHr

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads device software version

      Uses Android APIs to read software version number for the device (IMEI/SV for GSM devices).

MITRE ATT&CK Matrix

Tasks