General

  • Target

    6bec060cc0c3aa7ddd3d4de005dbdabd_JaffaCakes118

  • Size

    602KB

  • Sample

    240523-xf3v4scc7z

  • MD5

    6bec060cc0c3aa7ddd3d4de005dbdabd

  • SHA1

    a8e7abe5e7aaa8a0b6d52aae5ee6d4c1c9e2380b

  • SHA256

    75ef78181b828392c9d8ba2fb128cc71d3a20217f7b35d9b9eae5e25a260b5bb

  • SHA512

    45b35235249716bd2d1b1132ebcdd10cf9f0c24d7017bf34c39a8d630d8ce4e2602f19f69d9c7d1d087739819baeab1b0ae6a00ee83f426f88429c23e04e917d

  • SSDEEP

    12288:AuEaFZvkGGNUuWW1NVwCKn6GAx1d9H1BxyMGl9fDHxUNYL0NpX79s:PEaFmFN9v46flH7xyVfNGFf9s

Malware Config

Targets

    • Target

      6bec060cc0c3aa7ddd3d4de005dbdabd_JaffaCakes118

    • Size

      602KB

    • MD5

      6bec060cc0c3aa7ddd3d4de005dbdabd

    • SHA1

      a8e7abe5e7aaa8a0b6d52aae5ee6d4c1c9e2380b

    • SHA256

      75ef78181b828392c9d8ba2fb128cc71d3a20217f7b35d9b9eae5e25a260b5bb

    • SHA512

      45b35235249716bd2d1b1132ebcdd10cf9f0c24d7017bf34c39a8d630d8ce4e2602f19f69d9c7d1d087739819baeab1b0ae6a00ee83f426f88429c23e04e917d

    • SSDEEP

      12288:AuEaFZvkGGNUuWW1NVwCKn6GAx1d9H1BxyMGl9fDHxUNYL0NpX79s:PEaFmFN9v46flH7xyVfNGFf9s

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Removes its main activity from the application launcher

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Matrix

Tasks