General

  • Target

    75b99c08d08d62ee43079867a028c5e6_JaffaCakes118

  • Size

    8.2MB

  • Sample

    240526-rdqvwahg29

  • MD5

    75b99c08d08d62ee43079867a028c5e6

  • SHA1

    1948018b64b52d47118fd7a2c66d3f599b965180

  • SHA256

    79ffc1198e10b9c87fac2e8f49687f17bf05c32e0dde84f5cc4bd6c21f00b944

  • SHA512

    e3bbf722dfaf2e86a5125ba4649f497acfc7c51229b03fecac26ef5939edf7c103a217d0aee064d0745a068b2136b8449843d82f5c8926aae5bda6179b240205

  • SSDEEP

    196608:Zfk275Q4KPyObjJYqZyE9LlKmXRb4ok0qZJEbJESzgh+N91MTQ:ZRlxKPyObdZzLlBXd4o4ZJeJXU+NHOQ

Malware Config

Targets

    • Target

      75b99c08d08d62ee43079867a028c5e6_JaffaCakes118

    • Size

      8.2MB

    • MD5

      75b99c08d08d62ee43079867a028c5e6

    • SHA1

      1948018b64b52d47118fd7a2c66d3f599b965180

    • SHA256

      79ffc1198e10b9c87fac2e8f49687f17bf05c32e0dde84f5cc4bd6c21f00b944

    • SHA512

      e3bbf722dfaf2e86a5125ba4649f497acfc7c51229b03fecac26ef5939edf7c103a217d0aee064d0745a068b2136b8449843d82f5c8926aae5bda6179b240205

    • SSDEEP

      196608:Zfk275Q4KPyObjJYqZyE9LlKmXRb4ok0qZJEbJESzgh+N91MTQ:ZRlxKPyObdZzLlBXd4o4ZJeJXU+NHOQ

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks