General

  • Target

    740942ed1622aff27b7e3224d808fdca_JaffaCakes118

  • Size

    25.7MB

  • Sample

    240726-pj1adsxcnm

  • MD5

    740942ed1622aff27b7e3224d808fdca

  • SHA1

    01fe7b08710b7e05ce3915e0c6a4306993a2d3b0

  • SHA256

    2273b885128a18eeb87a55958048c03816a750664383cb550ea3095446f8ce28

  • SHA512

    9cfa0720ff7e24384267dca9dd8f69dd8ed1c8edfff366aeaa343c271576e322e2f71654cc078539b0fdafe6ad58b8939f29962cc6ddca158efd72056749c20a

  • SSDEEP

    786432:A5edry69S+/imXQewZLaPbX99cLo9OAcshT5vRb:A4VN9BamcOv8o9OJ2tF

Malware Config

Targets

    • Target

      740942ed1622aff27b7e3224d808fdca_JaffaCakes118

    • Size

      25.7MB

    • MD5

      740942ed1622aff27b7e3224d808fdca

    • SHA1

      01fe7b08710b7e05ce3915e0c6a4306993a2d3b0

    • SHA256

      2273b885128a18eeb87a55958048c03816a750664383cb550ea3095446f8ce28

    • SHA512

      9cfa0720ff7e24384267dca9dd8f69dd8ed1c8edfff366aeaa343c271576e322e2f71654cc078539b0fdafe6ad58b8939f29962cc6ddca158efd72056749c20a

    • SSDEEP

      786432:A5edry69S+/imXQewZLaPbX99cLo9OAcshT5vRb:A4VN9BamcOv8o9OJ2tF

    • Checks if the Android device is rooted.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks