Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    819760e3240527d98198cafff9ab7bfb_JaffaCakes118

  • Size

    19.2MB

  • Sample

    240529-xtvfwsed8v

  • MD5

    819760e3240527d98198cafff9ab7bfb

  • SHA1

    d9554e2a27c47fbb831b63b9a8546d0d65ea77e6

  • SHA256

    2b1ec8a0d6ae6fcb1b525ee59aab58c9b9962a9ed73524a65c54f8d751b006d0

  • SHA512

    ac3cd327e70d345da4be44898e369db71dba059f6b3b11596a27f45dc643582fb990e20f7cbf6ae34465bd98f9dfb25e906e45dc4384f59a62ee33738f01c958

  • SSDEEP

    393216:ojjQ9Zy1joIBB1uHRiNkr8scj+r2tF9Ymud3j7gfPdgZ7iiTrx5t:ojjQW1oQ2PY9F96TcGZeiT1f

Malware Config

Targets

    • Target

      819760e3240527d98198cafff9ab7bfb_JaffaCakes118

    • Size

      19.2MB

    • MD5

      819760e3240527d98198cafff9ab7bfb

    • SHA1

      d9554e2a27c47fbb831b63b9a8546d0d65ea77e6

    • SHA256

      2b1ec8a0d6ae6fcb1b525ee59aab58c9b9962a9ed73524a65c54f8d751b006d0

    • SHA512

      ac3cd327e70d345da4be44898e369db71dba059f6b3b11596a27f45dc643582fb990e20f7cbf6ae34465bd98f9dfb25e906e45dc4384f59a62ee33738f01c958

    • SSDEEP

      393216:ojjQ9Zy1joIBB1uHRiNkr8scj+r2tF9Ymud3j7gfPdgZ7iiTrx5t:ojjQW1oQ2PY9F96TcGZeiT1f

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks Android system properties for emulator presence.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks Qemu related system properties.

      Checks for Android system properties related to Qemu for Emulator detection.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks