General

  • Target

    905af64ac8dafb6656a968900fd26677_JaffaCakes118

  • Size

    15.2MB

  • Sample

    240603-dpby7shb4t

  • MD5

    905af64ac8dafb6656a968900fd26677

  • SHA1

    5a93ae750945b5fddf2509a0f143c93e006c1636

  • SHA256

    92dcc36e31b8d743d53be8e25e20e0c87697f85a3f067f6e42f88a0c5ee093f1

  • SHA512

    e73f2cc1a87c8b55513d86220ba39b9bb3606eaa15fa3e0fd5587efbca8806e9faf9d8e92885f17d4db14d968ef2b08490dd6c6bafea90fdd95d70efa091acd8

  • SSDEEP

    393216:BeblTbwaJkgRlonedGvce90EDfpsh/T45nNQ6Pe5DbuJ5:cIvISneIXa0xs54LQ6PYbuJ5

Malware Config

Targets

    • Target

      905af64ac8dafb6656a968900fd26677_JaffaCakes118

    • Size

      15.2MB

    • MD5

      905af64ac8dafb6656a968900fd26677

    • SHA1

      5a93ae750945b5fddf2509a0f143c93e006c1636

    • SHA256

      92dcc36e31b8d743d53be8e25e20e0c87697f85a3f067f6e42f88a0c5ee093f1

    • SHA512

      e73f2cc1a87c8b55513d86220ba39b9bb3606eaa15fa3e0fd5587efbca8806e9faf9d8e92885f17d4db14d968ef2b08490dd6c6bafea90fdd95d70efa091acd8

    • SSDEEP

      393216:BeblTbwaJkgRlonedGvce90EDfpsh/T45nNQ6Pe5DbuJ5:cIvISneIXa0xs54LQ6PYbuJ5

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the phone number (MSISDN for GSM devices)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests dangerous framework permissions

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks