General

  • Target

    ea71d2f079ed9e14bec1ba59e30ea4b9_JaffaCakes118

  • Size

    31.1MB

  • Sample

    240919-c9nm3axapd

  • MD5

    ea71d2f079ed9e14bec1ba59e30ea4b9

  • SHA1

    20a7513263779500a7a3c8d6673464d2f986ee7e

  • SHA256

    00bc4cc6ff2837de7c3216a7812c0fca1fa73a882778acfd50b4327b58368af7

  • SHA512

    cfeec4dee7840c6a26744a5a16cdac94459f2b6ba04616e7eefe5ff13eeb8d36ee54b72e61d559189f7d032c64c47a6c3c29d86865f1f2a08baa739d79ff8384

  • SSDEEP

    786432:MmcXwPGzhed8nLFAdOzfySMhgztgXEqKdLLp6wQFcvjk20Z:9cXwuzhgSAdOzfpMS5CKdLp6wrvjk2u

Malware Config

Targets

    • Target

      ea71d2f079ed9e14bec1ba59e30ea4b9_JaffaCakes118

    • Size

      31.1MB

    • MD5

      ea71d2f079ed9e14bec1ba59e30ea4b9

    • SHA1

      20a7513263779500a7a3c8d6673464d2f986ee7e

    • SHA256

      00bc4cc6ff2837de7c3216a7812c0fca1fa73a882778acfd50b4327b58368af7

    • SHA512

      cfeec4dee7840c6a26744a5a16cdac94459f2b6ba04616e7eefe5ff13eeb8d36ee54b72e61d559189f7d032c64c47a6c3c29d86865f1f2a08baa739d79ff8384

    • SSDEEP

      786432:MmcXwPGzhed8nLFAdOzfySMhgztgXEqKdLLp6wQFcvjk20Z:9cXwuzhgSAdOzfpMS5CKdLp6wrvjk2u

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks