General

  • Target

    6b2bc63e15d794825bbcc29482955cb2_JaffaCakes118

  • Size

    16.8MB

  • Sample

    240523-rbmqfade4y

  • MD5

    6b2bc63e15d794825bbcc29482955cb2

  • SHA1

    98b730dbe88936c1397a797e7ed699b6ab2a9197

  • SHA256

    28b36398f071c82b0ff07dbdc4e4e45d4db2e0cd7eeabbfdc8d55b438693f813

  • SHA512

    42930235b0a27f242ade79dec207591f36418a18af1b3d43866b5a77224e64e810001507957e17e187dbc15e2f55d53d4ab2b46aa3a69fb92a0e79667fac16ed

  • SSDEEP

    393216:PbGuYQcvy8VWMfZ6ePR0QTyLscLnFYh8hnt5jbbMgdjyLXJq:PbddcvtVWRe50QTyLscqh8JjbYqs5q

Malware Config

Targets

    • Target

      6b2bc63e15d794825bbcc29482955cb2_JaffaCakes118

    • Size

      16.8MB

    • MD5

      6b2bc63e15d794825bbcc29482955cb2

    • SHA1

      98b730dbe88936c1397a797e7ed699b6ab2a9197

    • SHA256

      28b36398f071c82b0ff07dbdc4e4e45d4db2e0cd7eeabbfdc8d55b438693f813

    • SHA512

      42930235b0a27f242ade79dec207591f36418a18af1b3d43866b5a77224e64e810001507957e17e187dbc15e2f55d53d4ab2b46aa3a69fb92a0e79667fac16ed

    • SSDEEP

      393216:PbGuYQcvy8VWMfZ6ePR0QTyLscLnFYh8hnt5jbbMgdjyLXJq:PbddcvtVWRe50QTyLscqh8JjbYqs5q

    • Checks if the Android device is rooted.

    • Checks Android system properties for emulator presence.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Checks the presence of a debugger

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks