General

  • Target

    534674063f2620470bdcf5836e6514af_JaffaCakes118

  • Size

    10.3MB

  • Sample

    240518-gn2d9aeg34

  • MD5

    534674063f2620470bdcf5836e6514af

  • SHA1

    654019291e504a352d3f1908b66649a9781f3e80

  • SHA256

    b8059c610fbcd50b038bdbc0d207243deb6255bb8f09020a0acc06c9d237550b

  • SHA512

    efd6e9745e01e258b748f48b3703f3c4aaa417469a932d679bf2962963d0268d4db9b3aa69e1a6e6ad031d29d65ca6e378eb55e2627bc7a7e625618bdb5d129e

  • SSDEEP

    196608:Vw23XnFZkhXPfaryKxUJlvIK1rRUFA11etSwbY3rBqD3PauNXGipcEbLmLECQUm9:Vw23XnFCh6GKCwK1rP11fKY9qDvBvmLM

Malware Config

Targets

    • Target

      534674063f2620470bdcf5836e6514af_JaffaCakes118

    • Size

      10.3MB

    • MD5

      534674063f2620470bdcf5836e6514af

    • SHA1

      654019291e504a352d3f1908b66649a9781f3e80

    • SHA256

      b8059c610fbcd50b038bdbc0d207243deb6255bb8f09020a0acc06c9d237550b

    • SHA512

      efd6e9745e01e258b748f48b3703f3c4aaa417469a932d679bf2962963d0268d4db9b3aa69e1a6e6ad031d29d65ca6e378eb55e2627bc7a7e625618bdb5d129e

    • SSDEEP

      196608:Vw23XnFZkhXPfaryKxUJlvIK1rRUFA11etSwbY3rBqD3PauNXGipcEbLmLECQUm9:Vw23XnFCh6GKCwK1rP11fKY9qDvBvmLM

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks