General

  • Target

    6d099818bd036a9fe026f83cf70f32a9_JaffaCakes118

  • Size

    25.7MB

  • Sample

    240524-cnqwashf8s

  • MD5

    6d099818bd036a9fe026f83cf70f32a9

  • SHA1

    f05517c211896cd31945995fcfa4334f4cd7eba9

  • SHA256

    beee6a03d6083675c3f97a849740c87f6cdcbf3de4fd8eda5d6405ddfa23b2b0

  • SHA512

    3c08396442ac2ebc7d8bdc9808ed3470b4d73397b7d030bfc3336b03f10563c001aff255bc3ba85ec8500263f2c2251f70f4c932dd5ddcd7d3a561816f3a4239

  • SSDEEP

    786432:CEtWKGpaj5reki6sxLUWmbQLDEiez0Qz+xBUE9JM:VtgaUFlx4WLLu2BtJM

Malware Config

Targets

    • Target

      6d099818bd036a9fe026f83cf70f32a9_JaffaCakes118

    • Size

      25.7MB

    • MD5

      6d099818bd036a9fe026f83cf70f32a9

    • SHA1

      f05517c211896cd31945995fcfa4334f4cd7eba9

    • SHA256

      beee6a03d6083675c3f97a849740c87f6cdcbf3de4fd8eda5d6405ddfa23b2b0

    • SHA512

      3c08396442ac2ebc7d8bdc9808ed3470b4d73397b7d030bfc3336b03f10563c001aff255bc3ba85ec8500263f2c2251f70f4c932dd5ddcd7d3a561816f3a4239

    • SSDEEP

      786432:CEtWKGpaj5reki6sxLUWmbQLDEiez0Qz+xBUE9JM:VtgaUFlx4WLLu2BtJM

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks