General

  • Target

    a7b9a32275df978cf2b97e62b4a31b31_JaffaCakes118

  • Size

    27.4MB

  • Sample

    240614-czvcvssbrc

  • MD5

    a7b9a32275df978cf2b97e62b4a31b31

  • SHA1

    f0bcb871eaa7fc7da8e2a8c0f6b2394bf3448723

  • SHA256

    0b22a9eb73a0496db31db29482ed3e428479c181ac164a12c54fe469aaf340f5

  • SHA512

    7e3b89cf3b0582dd8faa66ac0ee67768e402102b8bb1495595bdf6f94fe31d5e9765ddea0879cf8278ffc8adc8702d198149a3046eb1f5f48c44454830ffd60f

  • SSDEEP

    786432:v1dFjOuNeHwjsfpfVJndwgvYW9QzsCU6oG3zJME:rlz4r1dqZBoGDWE

Malware Config

Targets

    • Target

      a7b9a32275df978cf2b97e62b4a31b31_JaffaCakes118

    • Size

      27.4MB

    • MD5

      a7b9a32275df978cf2b97e62b4a31b31

    • SHA1

      f0bcb871eaa7fc7da8e2a8c0f6b2394bf3448723

    • SHA256

      0b22a9eb73a0496db31db29482ed3e428479c181ac164a12c54fe469aaf340f5

    • SHA512

      7e3b89cf3b0582dd8faa66ac0ee67768e402102b8bb1495595bdf6f94fe31d5e9765ddea0879cf8278ffc8adc8702d198149a3046eb1f5f48c44454830ffd60f

    • SSDEEP

      786432:v1dFjOuNeHwjsfpfVJndwgvYW9QzsCU6oG3zJME:rlz4r1dqZBoGDWE

    • Checks if the Android device is rooted.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks