General

  • Target

    50c6bd16143cfbd887c8417c5dee71a4_JaffaCakes118

  • Size

    21.4MB

  • Sample

    240517-wnsjnsbg97

  • MD5

    50c6bd16143cfbd887c8417c5dee71a4

  • SHA1

    4a50ab3b32103572935afd038bfcd8ed12518d82

  • SHA256

    61970069c6ee613bac07b5dc712b8942ca1d56103a974f728f217720b453345d

  • SHA512

    1e3bc59669575dddf7f06169286feb1e0ccee59b37003fb90034852eb803e71053ba83f7231eb6a45e69bbe4ac66757adddc4553d70981e0dee9d88b158df520

  • SSDEEP

    393216:jSU7OEAGRnFUNbzOxPcGpWtzcQ0x+uuzVL3RhhW2ojcMA7+q1xzu:rdd56NAcGpUzCx+uOvQgMA7h1xzu

Malware Config

Targets

    • Target

      50c6bd16143cfbd887c8417c5dee71a4_JaffaCakes118

    • Size

      21.4MB

    • MD5

      50c6bd16143cfbd887c8417c5dee71a4

    • SHA1

      4a50ab3b32103572935afd038bfcd8ed12518d82

    • SHA256

      61970069c6ee613bac07b5dc712b8942ca1d56103a974f728f217720b453345d

    • SHA512

      1e3bc59669575dddf7f06169286feb1e0ccee59b37003fb90034852eb803e71053ba83f7231eb6a45e69bbe4ac66757adddc4553d70981e0dee9d88b158df520

    • SSDEEP

      393216:jSU7OEAGRnFUNbzOxPcGpWtzcQ0x+uuzVL3RhhW2ojcMA7+q1xzu:rdd56NAcGpUzCx+uOvQgMA7h1xzu

    • Checks if the Android device is rooted.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks