General

  • Target

    8663850c6466366b3f8bebc684b70c80_JaffaCakes118

  • Size

    1.7MB

  • Sample

    240531-ke1yxadc27

  • MD5

    8663850c6466366b3f8bebc684b70c80

  • SHA1

    7cf56c48f78a09e78afb57cb637cb4923e55f93f

  • SHA256

    2a9e63e2b45c54fe185fd8db0a53a0deb189b90d980548b9cdc4639d3cc2b78c

  • SHA512

    678befa1c43602888222b319a02b3c1994d491169dd84618ae47c85ea9c13af11a2ad3546debc2b6b89e34d154c7aa57f7ca84b10b46d568f8f37027c3da150d

  • SSDEEP

    24576:v4AEK+CDjAO02OZGpUgW26LJbCwRik7XyMinU6Ur8HBHU6gAH0zk14Q:cyDEHZXgW2yJbbRiIifE8tH0zkqQ

Malware Config

Targets

    • Target

      8663850c6466366b3f8bebc684b70c80_JaffaCakes118

    • Size

      1.7MB

    • MD5

      8663850c6466366b3f8bebc684b70c80

    • SHA1

      7cf56c48f78a09e78afb57cb637cb4923e55f93f

    • SHA256

      2a9e63e2b45c54fe185fd8db0a53a0deb189b90d980548b9cdc4639d3cc2b78c

    • SHA512

      678befa1c43602888222b319a02b3c1994d491169dd84618ae47c85ea9c13af11a2ad3546debc2b6b89e34d154c7aa57f7ca84b10b46d568f8f37027c3da150d

    • SSDEEP

      24576:v4AEK+CDjAO02OZGpUgW26LJbCwRik7XyMinU6Ur8HBHU6gAH0zk14Q:cyDEHZXgW2yJbbRiIifE8tH0zkqQ

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of SMS inbox messages.

    • Reads the content of the SMS messages.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Requests dangerous framework permissions

    • Target

      BDTX140

    • Size

      99KB

    • MD5

      3d216f8fddb9705a6720a285475837f1

    • SHA1

      f053d23b284bfe2faf6e76d353ff052471e2de2c

    • SHA256

      de7bf40574754a5144fa5cf3bc5e97f7adc7f5abebb18c41e8f0631917db4c0c

    • SHA512

      38be39da8f96abc87109cfd57b2d63ddfa72971f023024a5b4ce1f97cd905a96a94e19eea19ae9b745f28d02c6689a4473627ce57ec85dce2018a77e699620cb

    • SSDEEP

      3072:O/hr91fY/9tdWXLqQRClwYJ4sAAq4/IZn8NxQNRmDJS:2B9NMDGLqofsAAbNI8g

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks