General

  • Target

    6da4a83c571ddf474cd3d65acec6c112_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240524-hkamssgg82

  • MD5

    6da4a83c571ddf474cd3d65acec6c112

  • SHA1

    735e22851a7edce0e1c530a56b9c61048172c7fb

  • SHA256

    0abb6cd6101885c09e4f77d14784b614138ca5b9d8dc1239cbcb11fbf1696b12

  • SHA512

    02abe57757e65e90dba7a1264e58208cd58445e4e5f0b311f6a0630d3cc585e2883f4fa83ff4b865e40d8bc7e696a45f150c6cbd5a09d732e8c2f03d37adc0a6

  • SSDEEP

    24576:G+GIt3/L89zYa5ARE3vd+m/A0ad7bHeKZCg9zS7DmbIf/I1hQcy:XoAIvd+l0aJMMu/3sny

Malware Config

Targets

    • Target

      6da4a83c571ddf474cd3d65acec6c112_JaffaCakes118

    • Size

      1.1MB

    • MD5

      6da4a83c571ddf474cd3d65acec6c112

    • SHA1

      735e22851a7edce0e1c530a56b9c61048172c7fb

    • SHA256

      0abb6cd6101885c09e4f77d14784b614138ca5b9d8dc1239cbcb11fbf1696b12

    • SHA512

      02abe57757e65e90dba7a1264e58208cd58445e4e5f0b311f6a0630d3cc585e2883f4fa83ff4b865e40d8bc7e696a45f150c6cbd5a09d732e8c2f03d37adc0a6

    • SSDEEP

      24576:G+GIt3/L89zYa5ARE3vd+m/A0ad7bHeKZCg9zS7DmbIf/I1hQcy:XoAIvd+l0aJMMu/3sny

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Matrix

Tasks