General

  • Target

    6a80ef189ac8d04756163358d5956c05_JaffaCakes118

  • Size

    15.1MB

  • Sample

    240523-lj5nbscb3v

  • MD5

    6a80ef189ac8d04756163358d5956c05

  • SHA1

    fb348666c06882d648dde2f0024f6abae9c22e1c

  • SHA256

    9c9ca1d052263bd1c2a0ad35b656e78e2644c5d84fbdf4405aff6d3745eba4b3

  • SHA512

    42cb82c4e1d76bbcbdd7db9b58b27dd9ef3f407e512e6106d202e9fe85c3be9db9227b9766145003d987f0f26a9c58e623cbf32805859abc5b9ee19847d7a28a

  • SSDEEP

    196608:NdW7YmcRJ0Dapphhyw7mpk8PVCZzgq3lr5SSEDMysS5nAtYt1V/v2vhCa8H:LW7Bs0DozJam4VCrVr5iDlhl1VP

Malware Config

Targets

    • Target

      6a80ef189ac8d04756163358d5956c05_JaffaCakes118

    • Size

      15.1MB

    • MD5

      6a80ef189ac8d04756163358d5956c05

    • SHA1

      fb348666c06882d648dde2f0024f6abae9c22e1c

    • SHA256

      9c9ca1d052263bd1c2a0ad35b656e78e2644c5d84fbdf4405aff6d3745eba4b3

    • SHA512

      42cb82c4e1d76bbcbdd7db9b58b27dd9ef3f407e512e6106d202e9fe85c3be9db9227b9766145003d987f0f26a9c58e623cbf32805859abc5b9ee19847d7a28a

    • SSDEEP

      196608:NdW7YmcRJ0Dapphhyw7mpk8PVCZzgq3lr5SSEDMysS5nAtYt1V/v2vhCa8H:LW7Bs0DozJam4VCrVr5iDlhl1VP

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks