General

  • Target

    877a2f7c38905dc5eb0188a49607a0cd_JaffaCakes118

  • Size

    28.3MB

  • Sample

    240531-sv18lsce51

  • MD5

    877a2f7c38905dc5eb0188a49607a0cd

  • SHA1

    4aaec0a2ab768a3b3abd2ae01f77b61d2d7623ae

  • SHA256

    061e5e2644778461921dcb30296cb6daef5055c69bea9017610649238279c32a

  • SHA512

    b370e2c555c8ddda67033995b9febb9de98aa7038d67f76610a5552095780a336ac8e33046591738f01f536b64fdd1e72c17e371a5d3647d12c1688792c83444

  • SSDEEP

    786432:s21bZ0rHTJzbG0Nm2V8Rr1B7BJjD7j3IUazxi9K0rUPLvnAlY:B1bZ4HRaG2rb7TKL0r2LJ

Malware Config

Targets

    • Target

      877a2f7c38905dc5eb0188a49607a0cd_JaffaCakes118

    • Size

      28.3MB

    • MD5

      877a2f7c38905dc5eb0188a49607a0cd

    • SHA1

      4aaec0a2ab768a3b3abd2ae01f77b61d2d7623ae

    • SHA256

      061e5e2644778461921dcb30296cb6daef5055c69bea9017610649238279c32a

    • SHA512

      b370e2c555c8ddda67033995b9febb9de98aa7038d67f76610a5552095780a336ac8e33046591738f01f536b64fdd1e72c17e371a5d3647d12c1688792c83444

    • SSDEEP

      786432:s21bZ0rHTJzbG0Nm2V8Rr1B7BJjD7j3IUazxi9K0rUPLvnAlY:B1bZ4HRaG2rb7TKL0r2LJ

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks