General

  • Target

    998b76492c7ecbdf827aaeaab3d3bafa_JaffaCakes118

  • Size

    7.0MB

  • Sample

    240605-3py66sch98

  • MD5

    998b76492c7ecbdf827aaeaab3d3bafa

  • SHA1

    570dd3d94b640f47e8f00011d100fb5e8b2d07fe

  • SHA256

    1eef3126120523d1c710fcc10001c228985853ac13b44c60d52aeb226b7ed838

  • SHA512

    d2fbf75244f2f1538d0605a7b119ce36547442fd8824276346b5df21332bb88ff4f080c7f7fb121a6678afd2a07be550afd1fb70b375db83310e7f8150c296f6

  • SSDEEP

    98304:rcZS/RgzP3U2LpZ7ipddWe2OQDdgm1ShnNy3QvxfKN+/h1h6R9KonT87zofh5joU:wZKR43U2fupXWe2TexXJrK9KonT8WA3k

Malware Config

Targets

    • Target

      998b76492c7ecbdf827aaeaab3d3bafa_JaffaCakes118

    • Size

      7.0MB

    • MD5

      998b76492c7ecbdf827aaeaab3d3bafa

    • SHA1

      570dd3d94b640f47e8f00011d100fb5e8b2d07fe

    • SHA256

      1eef3126120523d1c710fcc10001c228985853ac13b44c60d52aeb226b7ed838

    • SHA512

      d2fbf75244f2f1538d0605a7b119ce36547442fd8824276346b5df21332bb88ff4f080c7f7fb121a6678afd2a07be550afd1fb70b375db83310e7f8150c296f6

    • SSDEEP

      98304:rcZS/RgzP3U2LpZ7ipddWe2OQDdgm1ShnNy3QvxfKN+/h1h6R9KonT87zofh5joU:wZKR43U2fupXWe2TexXJrK9KonT8WA3k

    • Checks if the Android device is rooted.

    • Checks Android system properties for emulator presence.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks