General

  • Target

    6d79eaeb1ff5e9ad04a5e6f1ee2dfb8f_JaffaCakes118

  • Size

    2.0MB

  • Sample

    240524-f7hwksfa97

  • MD5

    6d79eaeb1ff5e9ad04a5e6f1ee2dfb8f

  • SHA1

    4373213fd7f0727ab8ed2bacbf6d711949781d98

  • SHA256

    8f769697cec7f607fd55de7a899c60ceba5c135f26e5e4e2eabadc5d71307117

  • SHA512

    ed71d5aec50461cd2f2a4b3a41c851663af9871316c5d712438cb2a737863f21fcbe7f943d7d2719c07c28ba6b4916950343bcf74646792f72287802ff4f70cb

  • SSDEEP

    49152:AaU0L4otlyJ4cmABHBPvQxVhcsEGuKh5NDumCOTK9KZB/:G9otgJ7RA3hcsf5NShHa

Malware Config

Targets

    • Target

      6d79eaeb1ff5e9ad04a5e6f1ee2dfb8f_JaffaCakes118

    • Size

      2.0MB

    • MD5

      6d79eaeb1ff5e9ad04a5e6f1ee2dfb8f

    • SHA1

      4373213fd7f0727ab8ed2bacbf6d711949781d98

    • SHA256

      8f769697cec7f607fd55de7a899c60ceba5c135f26e5e4e2eabadc5d71307117

    • SHA512

      ed71d5aec50461cd2f2a4b3a41c851663af9871316c5d712438cb2a737863f21fcbe7f943d7d2719c07c28ba6b4916950343bcf74646792f72287802ff4f70cb

    • SSDEEP

      49152:AaU0L4otlyJ4cmABHBPvQxVhcsEGuKh5NDumCOTK9KZB/:G9otgJ7RA3hcsf5NShHa

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks Android system properties for emulator presence.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads the content of SMS inbox messages.

    • Reads the content of the SMS messages.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Requests dangerous framework permissions

    • Target

      BDTX140

    • Size

      99KB

    • MD5

      3d216f8fddb9705a6720a285475837f1

    • SHA1

      f053d23b284bfe2faf6e76d353ff052471e2de2c

    • SHA256

      de7bf40574754a5144fa5cf3bc5e97f7adc7f5abebb18c41e8f0631917db4c0c

    • SHA512

      38be39da8f96abc87109cfd57b2d63ddfa72971f023024a5b4ce1f97cd905a96a94e19eea19ae9b745f28d02c6689a4473627ce57ec85dce2018a77e699620cb

    • SSDEEP

      3072:O/hr91fY/9tdWXLqQRClwYJ4sAAq4/IZn8NxQNRmDJS:2B9NMDGLqofsAAbNI8g

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks