General

  • Target

    fea1e14735da5e81fe858cd4ec54838d_JaffaCakes118

  • Size

    9.6MB

  • Sample

    240929-qs2egswekm

  • MD5

    fea1e14735da5e81fe858cd4ec54838d

  • SHA1

    d21b372f45b20f8767eebfe707f6008b75b68516

  • SHA256

    88dd0c90c5a7198179305c330bee8d92fbf7bda3b7d7bc5555ece530f376c300

  • SHA512

    3326ec450e232d58518664ede1a9f467d24ac3097500979d748c87d714edff6f8a007573bbbd60351e4457b03b4b6f1388fbe3b0b33ba8d8d129981272a47f61

  • SSDEEP

    196608:ajKHEAh7j6Sn4CHQVdXGwCqp+Quk08r8TfM7wrC9F6G6LOP3QDiYkS:ajEpjTn4CHCSEp8nfM7wG6G6yP3/YkS

Malware Config

Targets

    • Target

      fea1e14735da5e81fe858cd4ec54838d_JaffaCakes118

    • Size

      9.6MB

    • MD5

      fea1e14735da5e81fe858cd4ec54838d

    • SHA1

      d21b372f45b20f8767eebfe707f6008b75b68516

    • SHA256

      88dd0c90c5a7198179305c330bee8d92fbf7bda3b7d7bc5555ece530f376c300

    • SHA512

      3326ec450e232d58518664ede1a9f467d24ac3097500979d748c87d714edff6f8a007573bbbd60351e4457b03b4b6f1388fbe3b0b33ba8d8d129981272a47f61

    • SSDEEP

      196608:ajKHEAh7j6Sn4CHQVdXGwCqp+Quk08r8TfM7wrC9F6G6LOP3QDiYkS:ajEpjTn4CHCSEp8nfM7wG6G6yP3/YkS

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks