General

  • Target

    6deb68dbba0c53bb20bbababb3879df7_JaffaCakes118

  • Size

    20.6MB

  • Sample

    240524-kmclaabe99

  • MD5

    6deb68dbba0c53bb20bbababb3879df7

  • SHA1

    31b94616c9564344a40e12483a8564fbcfbf2e81

  • SHA256

    1f748f4f923820776d411279e065e24acece9d2bd7d1a620289a2026737d55f7

  • SHA512

    98026e3d17864011a806076d896a55c4bee641c944f13456286fc173242369a6a608f690475c129d3d284646fa7553a4435c11e4e0cf449692cab7b13aff571c

  • SSDEEP

    393216:15de5Yf+4PMrYeF7ueD/BGN9h9CAGk0KpBtT4rFvdc4rFvdkbHUcbRLxojV:bL+4PMrYs7ueDJG3hQAGk0K94Rvdc4Rh

Malware Config

Targets

    • Target

      6deb68dbba0c53bb20bbababb3879df7_JaffaCakes118

    • Size

      20.6MB

    • MD5

      6deb68dbba0c53bb20bbababb3879df7

    • SHA1

      31b94616c9564344a40e12483a8564fbcfbf2e81

    • SHA256

      1f748f4f923820776d411279e065e24acece9d2bd7d1a620289a2026737d55f7

    • SHA512

      98026e3d17864011a806076d896a55c4bee641c944f13456286fc173242369a6a608f690475c129d3d284646fa7553a4435c11e4e0cf449692cab7b13aff571c

    • SSDEEP

      393216:15de5Yf+4PMrYeF7ueD/BGN9h9CAGk0KpBtT4rFvdc4rFvdkbHUcbRLxojV:bL+4PMrYs7ueDJG3hQAGk0K94Rvdc4Rh

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

    • Reads the content of the call log.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks