General

  • Target

    a41874ee4e52c7b2c0549b727a0a8c67_JaffaCakes118

  • Size

    21.2MB

  • Sample

    240613-gpc32swgmf

  • MD5

    a41874ee4e52c7b2c0549b727a0a8c67

  • SHA1

    689a7fcae27df1a9719bc55d7aa695a3e17db0df

  • SHA256

    249476baa3055e6eacaf200557d3e856c8d3224c62757ef4525c51c74b93b1ba

  • SHA512

    f935e83e3eb8846d71783c620dd3e61c7b57b93f1b4e9e22c5d112cec5c6d3d6c7257c9f741d8215850cc63eb2d896676a331a25610e5c8b82420ec80eea8258

  • SSDEEP

    393216:LI0G4AgooJlYeJkh7YUNmck8Bvlt7B6SOkZ/Uq9aX1GzRowT9YgBXzmny8i6MG+e:LuGoo4h/Ic1tt7B6EdY1NIjmmGVBy53w

Malware Config

Targets

    • Target

      a41874ee4e52c7b2c0549b727a0a8c67_JaffaCakes118

    • Size

      21.2MB

    • MD5

      a41874ee4e52c7b2c0549b727a0a8c67

    • SHA1

      689a7fcae27df1a9719bc55d7aa695a3e17db0df

    • SHA256

      249476baa3055e6eacaf200557d3e856c8d3224c62757ef4525c51c74b93b1ba

    • SHA512

      f935e83e3eb8846d71783c620dd3e61c7b57b93f1b4e9e22c5d112cec5c6d3d6c7257c9f741d8215850cc63eb2d896676a331a25610e5c8b82420ec80eea8258

    • SSDEEP

      393216:LI0G4AgooJlYeJkh7YUNmck8Bvlt7B6SOkZ/Uq9aX1GzRowT9YgBXzmny8i6MG+e:LuGoo4h/Ic1tt7B6EdY1NIjmmGVBy53w

    • Checks if the Android device is rooted.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Matrix

Tasks