General

  • Target

    6ff9abd28c951bdf6dcbff04a2d1b934_JaffaCakes118

  • Size

    15.6MB

  • Sample

    241023-vnsn1ataqp

  • MD5

    6ff9abd28c951bdf6dcbff04a2d1b934

  • SHA1

    8653ef7858c9ffa6e7fa874db4af497b373160f3

  • SHA256

    d19ab17982d245dd0bd6a0caeb79c73746a24dffe436ab65fecab506bb0c2e4f

  • SHA512

    57e3c35b9d943da9e9d75c1a6a8326722666b68116e2a24e83e6dcd7955e12002cf8b9bbdda5f5638e8b3bda7affb64ea921c9b5c4af795a4268512d4470bf60

  • SSDEEP

    393216:FqaEl2Y3D/ipWA4y3ySwrQUnpMgnOKJrCbO9VFAYEN:UflP3D/XH7XbpZnOKJVvc

Malware Config

Targets

    • Target

      6ff9abd28c951bdf6dcbff04a2d1b934_JaffaCakes118

    • Size

      15.6MB

    • MD5

      6ff9abd28c951bdf6dcbff04a2d1b934

    • SHA1

      8653ef7858c9ffa6e7fa874db4af497b373160f3

    • SHA256

      d19ab17982d245dd0bd6a0caeb79c73746a24dffe436ab65fecab506bb0c2e4f

    • SHA512

      57e3c35b9d943da9e9d75c1a6a8326722666b68116e2a24e83e6dcd7955e12002cf8b9bbdda5f5638e8b3bda7affb64ea921c9b5c4af795a4268512d4470bf60

    • SSDEEP

      393216:FqaEl2Y3D/ipWA4y3ySwrQUnpMgnOKJrCbO9VFAYEN:UflP3D/XH7XbpZnOKJVvc

    • Checks if the Android device is rooted.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks