General

  • Target

    c2200851f8af766678697fa4d963225d_JaffaCakes118

  • Size

    20.8MB

  • Sample

    240826-c8hqeszgqc

  • MD5

    c2200851f8af766678697fa4d963225d

  • SHA1

    6bc8fff1ea048076fc557e9c2c553aee022b84b1

  • SHA256

    c35ff78921cfb1a0eb66aa60f4be17ad6568a61b8696441416e63fe92932622d

  • SHA512

    526b3762848f056f06ca75b0be299ae6b68229bed760faa029abda082c880956108c12c62667653c2c566adc9adf0364063cc1ccbb01596916fa5dc8876d2b61

  • SSDEEP

    393216:CSmAfbr93m7xfb7gpSqkA9VpBHSbtopqTwPHA54EJnjhCYJB+Pc/hdHDkb:CSxP93kD7A9HSgCwIiEs+BDXHQb

Malware Config

Targets

    • Target

      c2200851f8af766678697fa4d963225d_JaffaCakes118

    • Size

      20.8MB

    • MD5

      c2200851f8af766678697fa4d963225d

    • SHA1

      6bc8fff1ea048076fc557e9c2c553aee022b84b1

    • SHA256

      c35ff78921cfb1a0eb66aa60f4be17ad6568a61b8696441416e63fe92932622d

    • SHA512

      526b3762848f056f06ca75b0be299ae6b68229bed760faa029abda082c880956108c12c62667653c2c566adc9adf0364063cc1ccbb01596916fa5dc8876d2b61

    • SSDEEP

      393216:CSmAfbr93m7xfb7gpSqkA9VpBHSbtopqTwPHA54EJnjhCYJB+Pc/hdHDkb:CSxP93kD7A9HSgCwIiEs+BDXHQb

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks