General

  • Target

    76f8c7fb9b4cabdcac0e9c4290898bb0_JaffaCakes118

  • Size

    6.2MB

  • Sample

    240526-173wzafa37

  • MD5

    76f8c7fb9b4cabdcac0e9c4290898bb0

  • SHA1

    facc25e92081c4777d008fa317759a460ee983ee

  • SHA256

    74ff0f6c24671ebf688c1bac2ca2c7076983e107ddaaa460ff71730f307f15cc

  • SHA512

    3d4e5622b7f97eb006819ccd97532244507f7ada9fe88bdc6c7fe369bace2ce61e9a795d4aeb026eacc804535b83b16bf5e795ed7d0b2623cc4f627e25050292

  • SSDEEP

    196608:31ZyZcRTRqlj+RFMHTVjp4pbLzmOM9f1/df:31cZcRsKFmTVjqpbOD1lf

Malware Config

Targets

    • Target

      76f8c7fb9b4cabdcac0e9c4290898bb0_JaffaCakes118

    • Size

      6.2MB

    • MD5

      76f8c7fb9b4cabdcac0e9c4290898bb0

    • SHA1

      facc25e92081c4777d008fa317759a460ee983ee

    • SHA256

      74ff0f6c24671ebf688c1bac2ca2c7076983e107ddaaa460ff71730f307f15cc

    • SHA512

      3d4e5622b7f97eb006819ccd97532244507f7ada9fe88bdc6c7fe369bace2ce61e9a795d4aeb026eacc804535b83b16bf5e795ed7d0b2623cc4f627e25050292

    • SSDEEP

      196608:31ZyZcRTRqlj+RFMHTVjp4pbLzmOM9f1/df:31cZcRsKFmTVjqpbOD1lf

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of photos stored on the user's device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Target

      sdk.jar

    • Size

      127KB

    • MD5

      4e7bdc12dba237c8a237687d2c1baf34

    • SHA1

      7bdb206603276da76ae32f13f4baae8666680081

    • SHA256

      8fb02d79d0120da325059cde2c13c753f4ad219a2b16d865ce3e227410d2b595

    • SHA512

      d8d8b04f5292ab2eb4b33e71d89a2fc862c819b02f884ee7f3c04e42b65e1f1da5f0dc06451b8b3ef4d00056b945862811e48e5b2241f1bcc1821a556bce593a

    • SSDEEP

      3072:4N8riHb3oc5mcJzNemXxni7I9cvvGuaHeIp7cQGg87i:4WrKb3oc5llpXxni7I2i+IBjGgui

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks