Resubmissions

25-08-2024 06:54

240825-hn9las1bpf 10

General

  • Target

    c02f2be343893116a210ae1b2e64bf62_JaffaCakes118

  • Size

    30.8MB

  • Sample

    240825-hn9las1bpf

  • MD5

    c02f2be343893116a210ae1b2e64bf62

  • SHA1

    53043908731816cda4c8a5bc63f2ff89bd331d2a

  • SHA256

    bbdd5aeb146a5b078cb3401cd00c7a31873034d349352b9b99d7adedaefaba1a

  • SHA512

    9d3053de480138c8b310f46b0f04fa012de488d5dfd9a28903ab0a7e5956cace41ce32e51b6baf62f16f38f34c92805e613c3d3d4312f7dcb41fee1b0eee4868

  • SSDEEP

    786432:yzaUFJL/1SggjVOQKJrUVKqikAQ6mkXDx:w7JsPPurUkcAQ6jX1

Malware Config

Targets

    • Target

      c02f2be343893116a210ae1b2e64bf62_JaffaCakes118

    • Size

      30.8MB

    • MD5

      c02f2be343893116a210ae1b2e64bf62

    • SHA1

      53043908731816cda4c8a5bc63f2ff89bd331d2a

    • SHA256

      bbdd5aeb146a5b078cb3401cd00c7a31873034d349352b9b99d7adedaefaba1a

    • SHA512

      9d3053de480138c8b310f46b0f04fa012de488d5dfd9a28903ab0a7e5956cace41ce32e51b6baf62f16f38f34c92805e613c3d3d4312f7dcb41fee1b0eee4868

    • SSDEEP

      786432:yzaUFJL/1SggjVOQKJrUVKqikAQ6mkXDx:w7JsPPurUkcAQ6jX1

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Checks Qemu related system properties.

      Checks for Android system properties related to Qemu for Emulator detection.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Checks the presence of a debugger

    • Target

      ecloudy

    • Size

      9.1MB

    • MD5

      984855030f65a7039a613df2ed788988

    • SHA1

      31910e6aeff36bfb90663efbe5d286ca6b3d9cc5

    • SHA256

      77fb7b09edd9b6cecf00f7521c927d71ff7e21f433dca9a3c0bb56a191219c42

    • SHA512

      317cd04a4fa83dedd5c1daeb5fe37b9e4596dbc1e85f4174a0beb0c30540ca7b79dccc2c725aa01032ce66dfb40f99d3cfc51c262652ac7693d2da3fba9ede50

    • SSDEEP

      196608:/qPPYxvpie2SBsrebm1sCuQZotZxA8/FjmnKmo1rof8nPjDx6oPgZGx:/qPPYjietaibm+5QZotM8djOolP7t6oT

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks