General

  • Target

    8ee63ba05fda0246bdecee4329729ad7_JaffaCakes118

  • Size

    26.5MB

  • Sample

    240602-wbp8saag36

  • MD5

    8ee63ba05fda0246bdecee4329729ad7

  • SHA1

    ec0ca530c933b08258f0f07d22e204fb0bbe0e9e

  • SHA256

    a0e184a84e614302b68c3a3f111fe7b7d86151724d7810433999684dd489844b

  • SHA512

    3daddba06ccb98e63991cd67de6053074b697d91f112acf3e33de8561db811d1e3d838ae288009816e00fd39e9b896a4be36972b14f1c9bcf809189b505f0f3b

  • SSDEEP

    786432:28MlpG3RXn4XEdXDRCvCFRbCfS+ozw20lR4:28ipKR34KFCvCFR823

Malware Config

Targets

    • Target

      8ee63ba05fda0246bdecee4329729ad7_JaffaCakes118

    • Size

      26.5MB

    • MD5

      8ee63ba05fda0246bdecee4329729ad7

    • SHA1

      ec0ca530c933b08258f0f07d22e204fb0bbe0e9e

    • SHA256

      a0e184a84e614302b68c3a3f111fe7b7d86151724d7810433999684dd489844b

    • SHA512

      3daddba06ccb98e63991cd67de6053074b697d91f112acf3e33de8561db811d1e3d838ae288009816e00fd39e9b896a4be36972b14f1c9bcf809189b505f0f3b

    • SSDEEP

      786432:28MlpG3RXn4XEdXDRCvCFRbCfS+ozw20lR4:28ipKR34KFCvCFR823

    • Checks if the Android device is rooted.

    • Checks Android system properties for emulator presence.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks