General

  • Target

    82f6e45a4193ea93c8c7d0fbe82d57bd_JaffaCakes118

  • Size

    30.8MB

  • Sample

    240530-ehb63aef22

  • MD5

    82f6e45a4193ea93c8c7d0fbe82d57bd

  • SHA1

    c1b51c7498ce74944f619357f216c7bdabe69cb0

  • SHA256

    e580ca75cff186b37402383f0d46e2c5123672bdbae08cd422d98289de3377ed

  • SHA512

    bee80c7c0c5aa9e693158350370fab71d9692aedd05977a17d51eb4b1f2722c45142f0dd4b638fc6020160663785644f5527361f7726146751cdc8b3fff8994f

  • SSDEEP

    393216:F67NDGrXPikc2b7DzUMpsjZjF457aLlFTUblaF/tVaQgaDOJ2pfMK6PE/slfEGIV:Fg8/6A7GlFTUb4QU8Tw/sat1+T9+2ho

Malware Config

Targets

    • Target

      82f6e45a4193ea93c8c7d0fbe82d57bd_JaffaCakes118

    • Size

      30.8MB

    • MD5

      82f6e45a4193ea93c8c7d0fbe82d57bd

    • SHA1

      c1b51c7498ce74944f619357f216c7bdabe69cb0

    • SHA256

      e580ca75cff186b37402383f0d46e2c5123672bdbae08cd422d98289de3377ed

    • SHA512

      bee80c7c0c5aa9e693158350370fab71d9692aedd05977a17d51eb4b1f2722c45142f0dd4b638fc6020160663785644f5527361f7726146751cdc8b3fff8994f

    • SSDEEP

      393216:F67NDGrXPikc2b7DzUMpsjZjF457aLlFTUblaF/tVaQgaDOJ2pfMK6PE/slfEGIV:Fg8/6A7GlFTUb4QU8Tw/sat1+T9+2ho

    • Checks if the Android device is rooted.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks