General

  • Target

    9e2a5a822e02402b38a6e1945f88b9f3_JaffaCakes118

  • Size

    11.3MB

  • Sample

    240611-pj4mtawgke

  • MD5

    9e2a5a822e02402b38a6e1945f88b9f3

  • SHA1

    9be464becb1f1d4705e49c0f57105a8770753d25

  • SHA256

    38ae7fa2766039c728edb5ff170b1f34ae1140db393ba3fba4a6f850db02cb3e

  • SHA512

    9a09b557edee70243adbd2aa482f67746e4568371af3c88dec2e15d1b3edfaf9776f7271a37706f159ef2950d976d6a50e76edc963099ccf70976628d0bfee0d

  • SSDEEP

    196608:61vDIqXt3rhyZJhP/xcGg9jFbb/pOdYlTvCHb3lblOvrvp/ddhBifZzfIQ3pjMuI:61sqpwXhP/sxPOdYlTK7lszvp/ddvif2

Malware Config

Targets

    • Target

      9e2a5a822e02402b38a6e1945f88b9f3_JaffaCakes118

    • Size

      11.3MB

    • MD5

      9e2a5a822e02402b38a6e1945f88b9f3

    • SHA1

      9be464becb1f1d4705e49c0f57105a8770753d25

    • SHA256

      38ae7fa2766039c728edb5ff170b1f34ae1140db393ba3fba4a6f850db02cb3e

    • SHA512

      9a09b557edee70243adbd2aa482f67746e4568371af3c88dec2e15d1b3edfaf9776f7271a37706f159ef2950d976d6a50e76edc963099ccf70976628d0bfee0d

    • SSDEEP

      196608:61vDIqXt3rhyZJhP/xcGg9jFbb/pOdYlTvCHb3lblOvrvp/ddhBifZzfIQ3pjMuI:61sqpwXhP/sxPOdYlTK7lszvp/ddvif2

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks