General

  • Target

    50398c542dab3bb43f746e8566bc1850_JaffaCakes118

  • Size

    31.5MB

  • Sample

    240517-s3a2dsed71

  • MD5

    50398c542dab3bb43f746e8566bc1850

  • SHA1

    e174dd09628913e224544de01be88876315a5be4

  • SHA256

    0f1f546e1454886d73786f13f3bd64a671c07e9c289652a2ce46d9fc66584948

  • SHA512

    f7e869c602867c17922e0e4b464044ec212a2616b1677a2e7c82f1de6e732cbfaddf55dbb49abc78e4d0f4353f14d0428ca0f5a1aa0126f1a835971b91521877

  • SSDEEP

    786432:9Y3ELjFcbHF1d6t/pYKqpLIVXxOYKGrxCsAI:9P+rFaJpYKq+IYppt

Malware Config

Targets

    • Target

      50398c542dab3bb43f746e8566bc1850_JaffaCakes118

    • Size

      31.5MB

    • MD5

      50398c542dab3bb43f746e8566bc1850

    • SHA1

      e174dd09628913e224544de01be88876315a5be4

    • SHA256

      0f1f546e1454886d73786f13f3bd64a671c07e9c289652a2ce46d9fc66584948

    • SHA512

      f7e869c602867c17922e0e4b464044ec212a2616b1677a2e7c82f1de6e732cbfaddf55dbb49abc78e4d0f4353f14d0428ca0f5a1aa0126f1a835971b91521877

    • SSDEEP

      786432:9Y3ELjFcbHF1d6t/pYKqpLIVXxOYKGrxCsAI:9P+rFaJpYKq+IYppt

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks