General

  • Target

    886398b02d8f404e8a8ae866a9b60f72_JaffaCakes118

  • Size

    23.4MB

  • Sample

    240531-z6vzasdg2z

  • MD5

    886398b02d8f404e8a8ae866a9b60f72

  • SHA1

    2060a68537233c70b81687bf6a9c704d834fa37a

  • SHA256

    ab77fad2bd4864691e637cc4eccb6d4ac64c115c160a6fecde795efb510ed538

  • SHA512

    1b52855c87c877373ea2f7c8de2f40d115e51a1b08c3e7c0207420c2a189db062197070b2cc6e5ccf9847fb9fdb7f7f6e68b30f42f1bceff9a9cde623bb3bad4

  • SSDEEP

    393216:tCnCcKi4fLjAuTaOvLDehPbqa0SIDvwSEEyer9JCGZeVpXDU6MQEtqwWwRgYk/nz:tCnCDDjWOvveNbMDvwSKem0szU6lOqwW

Malware Config

Targets

    • Target

      886398b02d8f404e8a8ae866a9b60f72_JaffaCakes118

    • Size

      23.4MB

    • MD5

      886398b02d8f404e8a8ae866a9b60f72

    • SHA1

      2060a68537233c70b81687bf6a9c704d834fa37a

    • SHA256

      ab77fad2bd4864691e637cc4eccb6d4ac64c115c160a6fecde795efb510ed538

    • SHA512

      1b52855c87c877373ea2f7c8de2f40d115e51a1b08c3e7c0207420c2a189db062197070b2cc6e5ccf9847fb9fdb7f7f6e68b30f42f1bceff9a9cde623bb3bad4

    • SSDEEP

      393216:tCnCcKi4fLjAuTaOvLDehPbqa0SIDvwSEEyer9JCGZeVpXDU6MQEtqwWwRgYk/nz:tCnCDDjWOvveNbMDvwSKem0szU6lOqwW

    • Checks if the Android device is rooted.

    • Checks Android system properties for emulator presence.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Mobile v15

Tasks