General

  • Target

    6ced0f2f4b81c1cced1e09019740dd04_JaffaCakes118

  • Size

    29.9MB

  • Sample

    240524-bxgtbage99

  • MD5

    6ced0f2f4b81c1cced1e09019740dd04

  • SHA1

    589365b6d03f50e77e21fff18ca6fa58fdce13e8

  • SHA256

    2c3be1db019077e19d3de552e00eb31c8e87dafe3b45dea59e5bf90220403cf8

  • SHA512

    42a86a1a41f96ee1b21fb47f706ccdb40e5c6f9d3215dfb1e55679f172c187c29d3f635383a46b2fec817969352cba5a3f80753edabb4708b23c2c6ee6ace96b

  • SSDEEP

    786432:PdyDnDAvW52MPrOn7nyDNLJD4NQr3tS2H0Zz:P8jDAvWbrOn7n+NlD4NQzf2z

Malware Config

Targets

    • Target

      6ced0f2f4b81c1cced1e09019740dd04_JaffaCakes118

    • Size

      29.9MB

    • MD5

      6ced0f2f4b81c1cced1e09019740dd04

    • SHA1

      589365b6d03f50e77e21fff18ca6fa58fdce13e8

    • SHA256

      2c3be1db019077e19d3de552e00eb31c8e87dafe3b45dea59e5bf90220403cf8

    • SHA512

      42a86a1a41f96ee1b21fb47f706ccdb40e5c6f9d3215dfb1e55679f172c187c29d3f635383a46b2fec817969352cba5a3f80753edabb4708b23c2c6ee6ace96b

    • SSDEEP

      786432:PdyDnDAvW52MPrOn7nyDNLJD4NQr3tS2H0Zz:P8jDAvWbrOn7n+NlD4NQzf2z

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks Qemu related system properties.

      Checks for Android system properties related to Qemu for Emulator detection.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks