General

  • Target

    712b4eff09ae251587616e0e143435f1_JaffaCakes118

  • Size

    3.4MB

  • Sample

    240525-hlan7ahg96

  • MD5

    712b4eff09ae251587616e0e143435f1

  • SHA1

    5e101106ff65d46367c6e380885cb7bc560c3858

  • SHA256

    15259758b346f1b5a9bfc102f939b3631bdaf9372fa5abfb7a750d9245eada9a

  • SHA512

    246871770310d4a862b7d6caf79b016f5068a4b3b6b13c2ef72b0e6c516c19996612cc410733118ac9575530dc61071ae7ab3e45d0b0fb7a48e25939b2a85343

  • SSDEEP

    98304:d1UJIzyTs1tiTD5b3VNUkLE9h62RPcFwTTZlv1zz4TR:dUlnUkQ9s2R0FwTTZXzu

Malware Config

Targets

    • Target

      712b4eff09ae251587616e0e143435f1_JaffaCakes118

    • Size

      3.4MB

    • MD5

      712b4eff09ae251587616e0e143435f1

    • SHA1

      5e101106ff65d46367c6e380885cb7bc560c3858

    • SHA256

      15259758b346f1b5a9bfc102f939b3631bdaf9372fa5abfb7a750d9245eada9a

    • SHA512

      246871770310d4a862b7d6caf79b016f5068a4b3b6b13c2ef72b0e6c516c19996612cc410733118ac9575530dc61071ae7ab3e45d0b0fb7a48e25939b2a85343

    • SSDEEP

      98304:d1UJIzyTs1tiTD5b3VNUkLE9h62RPcFwTTZlv1zz4TR:dUlnUkQ9s2R0FwTTZXzu

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Removes its main activity from the application launcher

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks