General

  • Target

    7fc18e1f00409938bc6170f79e004426_JaffaCakes118

  • Size

    5.3MB

  • Sample

    240529-gzrdesdh22

  • MD5

    7fc18e1f00409938bc6170f79e004426

  • SHA1

    38dcd49e605a0e9ba74b72e0154e863bc7eade81

  • SHA256

    2a392c8a0b7c7dcf934e610433b8c67634695aa54c5d08438ad48026cb54ebfa

  • SHA512

    2ade6279225be3e48f24a996655c647854996d0ea7f2fd131f95527746ac6119332bb33b69f516b26b7d30d56d70301ae61a5fe9134c8ca68a7b213701301a01

  • SSDEEP

    98304:L3rFsb0LtjiJ7YjWQg3UYOlQ2561e5T222222qt2NUaXTWk+PNQS:L32g5YYj+UYx1eutyUaDN+f

Malware Config

Targets

    • Target

      7fc18e1f00409938bc6170f79e004426_JaffaCakes118

    • Size

      5.3MB

    • MD5

      7fc18e1f00409938bc6170f79e004426

    • SHA1

      38dcd49e605a0e9ba74b72e0154e863bc7eade81

    • SHA256

      2a392c8a0b7c7dcf934e610433b8c67634695aa54c5d08438ad48026cb54ebfa

    • SHA512

      2ade6279225be3e48f24a996655c647854996d0ea7f2fd131f95527746ac6119332bb33b69f516b26b7d30d56d70301ae61a5fe9134c8ca68a7b213701301a01

    • SSDEEP

      98304:L3rFsb0LtjiJ7YjWQg3UYOlQ2561e5T222222qt2NUaXTWk+PNQS:L32g5YYj+UYx1eutyUaDN+f

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the phone number (MSISDN for GSM devices)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks