General

  • Target

    842c0ebcc866588dd34db43767c7675b_JaffaCakes118

  • Size

    18.0MB

  • Sample

    240530-pjapqshg35

  • MD5

    842c0ebcc866588dd34db43767c7675b

  • SHA1

    8295825359d792eacfbaa4db8231a81d93198dc8

  • SHA256

    7fa9f7ba30a692886df2e181c10b16740a4b9272b2ed7ff9ad17e04c3828bf6c

  • SHA512

    db6d27fb94965e506297a7b564d2ffba494b7a9c4be1c8d1874b0e90121a8e972f448b0f8f51f983ce3d18a37deb6f5cde311d6fc8538e1d349403c516a6e0be

  • SSDEEP

    393216:QmM+tW4Dd2VzzrZkLJCIUex0y4AtUb9PCfGxdfW6gQzKsL/6gc96yAyqTiSy:Qt+tW4ARd160CCb9PQGq6goPc9KRy

Malware Config

Targets

    • Target

      842c0ebcc866588dd34db43767c7675b_JaffaCakes118

    • Size

      18.0MB

    • MD5

      842c0ebcc866588dd34db43767c7675b

    • SHA1

      8295825359d792eacfbaa4db8231a81d93198dc8

    • SHA256

      7fa9f7ba30a692886df2e181c10b16740a4b9272b2ed7ff9ad17e04c3828bf6c

    • SHA512

      db6d27fb94965e506297a7b564d2ffba494b7a9c4be1c8d1874b0e90121a8e972f448b0f8f51f983ce3d18a37deb6f5cde311d6fc8538e1d349403c516a6e0be

    • SSDEEP

      393216:QmM+tW4Dd2VzzrZkLJCIUex0y4AtUb9PCfGxdfW6gQzKsL/6gc96yAyqTiSy:Qt+tW4ARd160CCb9PQGq6goPc9KRy

    • Checks if the Android device is rooted.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks