General

  • Target

    b597a4842cbd2245eb5793a11b721c04_JaffaCakes118

  • Size

    11.9MB

  • Sample

    240616-2sbplssarc

  • MD5

    b597a4842cbd2245eb5793a11b721c04

  • SHA1

    466896fa57c36dae89e636cd9684a138ecebd3ad

  • SHA256

    e00935a5618fb4726b4b3d93702a8b64795eef1ece9e4c1f9a3e906c1c37b8a6

  • SHA512

    e2e87544139c6a212fbc413f95bd80462553959cc9b97e4fae1410d83fdf15f0519b1ec489add7bf76012a3e825d404cc4492b54292c1d87f0a5323d9c00309a

  • SSDEEP

    196608:dsldDIkDEp00gUtcmo484WqUbGntjHGJACvtuN+k4y5IjnFTxcBxvqtOXoB1XG51:d8U4G0j6cd8W9Mtjm7vANRj5UFTxcopK

Malware Config

Targets

    • Target

      b597a4842cbd2245eb5793a11b721c04_JaffaCakes118

    • Size

      11.9MB

    • MD5

      b597a4842cbd2245eb5793a11b721c04

    • SHA1

      466896fa57c36dae89e636cd9684a138ecebd3ad

    • SHA256

      e00935a5618fb4726b4b3d93702a8b64795eef1ece9e4c1f9a3e906c1c37b8a6

    • SHA512

      e2e87544139c6a212fbc413f95bd80462553959cc9b97e4fae1410d83fdf15f0519b1ec489add7bf76012a3e825d404cc4492b54292c1d87f0a5323d9c00309a

    • SSDEEP

      196608:dsldDIkDEp00gUtcmo484WqUbGntjHGJACvtuN+k4y5IjnFTxcBxvqtOXoB1XG51:d8U4G0j6cd8W9Mtjm7vANRj5UFTxcopK

    • Checks if the Android device is rooted.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

    • Target

      bp.db

    • Size

      503KB

    • MD5

      cbdc22d39c0a5d6b573bc4c3a0723d62

    • SHA1

      0277b88cf6223860c62a6ea0936b57fa4d6e3e5d

    • SHA256

      687c013d34e4519d797549b0b34562855e44f645ac1ccca8f74de0fbdd380717

    • SHA512

      5ba5d67f170a94afbe9a8544c3a92190ec90fdeeac0313ea735e72022d2669c9f8e7691039e08e0b23f174ed5a0eeef11d7a426725fa25810d67a8342df45abe

    • SSDEEP

      12288:f2HrgTAxStoLvnA89xX2GV45+a5hL/s8BocGJVp7:f2HrgUxSGv2u+7hocUz7

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Mobile v15

Tasks