General

  • Target

    6f480b0daee4c4ba31065b35297d76f9_JaffaCakes118

  • Size

    21.0MB

  • Sample

    240524-v1237sdf95

  • MD5

    6f480b0daee4c4ba31065b35297d76f9

  • SHA1

    f9399a1de78340456c1d7e9b3897c8f19e87c844

  • SHA256

    865745325e065490aef3f8cab8dcf0607633b42652a1d4191aff97235d9839c3

  • SHA512

    fd6c7e78af61436214a59e1ad3481ce3e4a09fb9cd423dd987e071079def06f6df3d21c7ce4b69665fb27cb8a14e82bf1218b5f43d8d88429474c80f8aa2bebc

  • SSDEEP

    393216:acWr1xtarURHYWngmuPzkabwIS4SgSxAGaQsV5GhH:sxL9YwgrIlIwgSiGjsPGhH

Malware Config

Targets

    • Target

      6f480b0daee4c4ba31065b35297d76f9_JaffaCakes118

    • Size

      21.0MB

    • MD5

      6f480b0daee4c4ba31065b35297d76f9

    • SHA1

      f9399a1de78340456c1d7e9b3897c8f19e87c844

    • SHA256

      865745325e065490aef3f8cab8dcf0607633b42652a1d4191aff97235d9839c3

    • SHA512

      fd6c7e78af61436214a59e1ad3481ce3e4a09fb9cd423dd987e071079def06f6df3d21c7ce4b69665fb27cb8a14e82bf1218b5f43d8d88429474c80f8aa2bebc

    • SSDEEP

      393216:acWr1xtarURHYWngmuPzkabwIS4SgSxAGaQsV5GhH:sxL9YwgrIlIwgSiGjsPGhH

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks