General

  • Target

    736eefd8c66441f39538c6643e81080e_JaffaCakes118

  • Size

    21.5MB

  • Sample

    240525-19am7sce3t

  • MD5

    736eefd8c66441f39538c6643e81080e

  • SHA1

    05142b21d96abc460301d9ceac1285bdff4d685f

  • SHA256

    1d5af95ec2c7665844b8a793ec205f14219647077ec251f7e596a1d2e4f85f13

  • SHA512

    4c12293c09eb7003625152aecd41fe4cc4213f911408e335871924046c4e22b7c7a791cbf9f6685212d0308019fa68bf630b1fd8ac5c3bb0287cdd2674902587

  • SSDEEP

    393216:/eozyhOqTKySss8oGpnU7aM1CL/zgaxGjN9dSrC/7KWRGd5Td/6YAJj4XE72:/RUOqnJpMaoCLzgaIBSOTPGfd/tmjd2

Malware Config

Targets

    • Target

      736eefd8c66441f39538c6643e81080e_JaffaCakes118

    • Size

      21.5MB

    • MD5

      736eefd8c66441f39538c6643e81080e

    • SHA1

      05142b21d96abc460301d9ceac1285bdff4d685f

    • SHA256

      1d5af95ec2c7665844b8a793ec205f14219647077ec251f7e596a1d2e4f85f13

    • SHA512

      4c12293c09eb7003625152aecd41fe4cc4213f911408e335871924046c4e22b7c7a791cbf9f6685212d0308019fa68bf630b1fd8ac5c3bb0287cdd2674902587

    • SSDEEP

      393216:/eozyhOqTKySss8oGpnU7aM1CL/zgaxGjN9dSrC/7KWRGd5Td/6YAJj4XE72:/RUOqnJpMaoCLzgaIBSOTPGfd/tmjd2

    • Checks if the Android device is rooted.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

    • Listens for changes in the sensor environment (might be used to detect emulation)

    • Target

      gdtadv2.jar

    • Size

      184KB

    • MD5

      027ece4a90aac4d84812efa9b20b2af7

    • SHA1

      564ec02d38ad8419fb3a96bed470c7a2632d3c35

    • SHA256

      ce6f738fc3df590a63cf02cae624cae1384a3198b24b9e11d26d1818c45ab98d

    • SHA512

      fbbdec0c28dc0c32d398f1e28cbf5a76a496bf8f6613a90aeda99ef62ff042eb58cd7cf747b1b03ce6cba00caecf1f20a0251d7b3fb999ddecdd3b01ade209e0

    • SSDEEP

      3072:npJhJKLgGoJc+oJIvPy2/wD0WZRv18NIkTbIgdSqwsKj7OnY2KFSt9LGKLRM:npJhJxr/HyB0oNmHIgd2pj7cYe3LRM

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks