General

  • Target

    89f6eb3dc1ca65900b7e26834458df21_JaffaCakes118

  • Size

    2.8MB

  • Sample

    240601-kzl1gsgb2v

  • MD5

    89f6eb3dc1ca65900b7e26834458df21

  • SHA1

    899b0ea3ec25f8b4e3d4a4f556f19ef32efc94fb

  • SHA256

    930393756bae94fc5bc0147703336c6414ce480c965d44f1afdab80c10cb4d5b

  • SHA512

    733ecef4229b2f464a16a93822ff666e95f982a9b54d9530fd42c75556ee695b296fe613e6fc91638b9d4feb2887c232e6e845505f1e6fc3575076700ef88165

  • SSDEEP

    49152:mUyzDvaVZRp7MRy9HulVTsqVyPWpLO/aGfwQqD4CCFMBNtyP1uFMBNtlwiriuPCX:mmrpgpPTrVy4SaGfQD4FNzPrLNAt

Malware Config

Targets

    • Target

      89f6eb3dc1ca65900b7e26834458df21_JaffaCakes118

    • Size

      2.8MB

    • MD5

      89f6eb3dc1ca65900b7e26834458df21

    • SHA1

      899b0ea3ec25f8b4e3d4a4f556f19ef32efc94fb

    • SHA256

      930393756bae94fc5bc0147703336c6414ce480c965d44f1afdab80c10cb4d5b

    • SHA512

      733ecef4229b2f464a16a93822ff666e95f982a9b54d9530fd42c75556ee695b296fe613e6fc91638b9d4feb2887c232e6e845505f1e6fc3575076700ef88165

    • SSDEEP

      49152:mUyzDvaVZRp7MRy9HulVTsqVyPWpLO/aGfwQqD4CCFMBNtyP1uFMBNtlwiriuPCX:mmrpgpPTrVy4SaGfQD4FNzPrLNAt

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks Android system properties for emulator presence.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the phone number (MSISDN for GSM devices)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Target

      res.bin

    • Size

      205KB

    • MD5

      dafb7d4b90ea8d376128c625183dd9ad

    • SHA1

      883c9b0586e740e9fb976d27a437e84fc26e92fd

    • SHA256

      07be7e035e50b372d700b7cc148515a26b0775b2b485e50895988753fe24b12b

    • SHA512

      56deefb30f358f2d404c93725f331374f0878b8121d95412ab1b1299364b2eea2b7fe179e21bbe96f4076300556a09f55825118ff67b401504c2f3b82af6b13b

    • SSDEEP

      3072:jFsFh83XDWxVFkPRLccq5sOwglfnhdQkWVsXQp6D9PhTbnEaxEiQWu6vSP:jFrzWlkKcqiglfnrXDRFnEaxxaP

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks