General

  • Target

    60394bc237bfc7f50e94ea23ff6581a7_JaffaCakes118

  • Size

    7.6MB

  • Sample

    240720-2dspksyaqg

  • MD5

    60394bc237bfc7f50e94ea23ff6581a7

  • SHA1

    9927458d67504e1e615c942613627f89f5fd5a22

  • SHA256

    97611d4d6e5e9aef1eb23e728232ca893a266a59487cae13fe9f35df12945a14

  • SHA512

    0f406b38086358eb37ff4ab2dc30b0be4588758387c4eafc00e69845aa2fcd4be5d10a8b559472c819a066c4cb8c5739fcb7fbb22ddbd71a9fec4bd192781340

  • SSDEEP

    196608:xpHOroJ7E5qaro13ghwTHwaZ7pGnlPIYa8retoBJMWt5aIGic7V4H:xNOroJ45jiCi1Z1+PIYXHtma

Malware Config

Targets

    • Target

      60394bc237bfc7f50e94ea23ff6581a7_JaffaCakes118

    • Size

      7.6MB

    • MD5

      60394bc237bfc7f50e94ea23ff6581a7

    • SHA1

      9927458d67504e1e615c942613627f89f5fd5a22

    • SHA256

      97611d4d6e5e9aef1eb23e728232ca893a266a59487cae13fe9f35df12945a14

    • SHA512

      0f406b38086358eb37ff4ab2dc30b0be4588758387c4eafc00e69845aa2fcd4be5d10a8b559472c819a066c4cb8c5739fcb7fbb22ddbd71a9fec4bd192781340

    • SSDEEP

      196608:xpHOroJ7E5qaro13ghwTHwaZ7pGnlPIYa8retoBJMWt5aIGic7V4H:xNOroJ45jiCi1Z1+PIYXHtma

    • Checks if the Android device is rooted.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks