General

  • Target

    534623173fb171825fe00a45a311f8af_JaffaCakes118

  • Size

    6.4MB

  • Sample

    240518-gnvayaef9x

  • MD5

    534623173fb171825fe00a45a311f8af

  • SHA1

    f264c2e77403be4b091c1ff9ab38f947b1d4951a

  • SHA256

    a273b1dfa83f97354966ce74ba780b6e8d93a4ba23d73334c7f4ee35673b2074

  • SHA512

    109e4a3b57149c5bd2447f8cf22b53a84683801357a72b7a3c4dd4b8c9f7de4d7519235714edcc3c92b3131bb6c63ca6c44d1d09097ee0ae69b27c43c03aad42

  • SSDEEP

    196608:E4xotv3Jt+M/+ZVuT7IoeF+5XrqhYgeD8SJ02:E4Sv3z+MW+Je91I

Malware Config

Targets

    • Target

      534623173fb171825fe00a45a311f8af_JaffaCakes118

    • Size

      6.4MB

    • MD5

      534623173fb171825fe00a45a311f8af

    • SHA1

      f264c2e77403be4b091c1ff9ab38f947b1d4951a

    • SHA256

      a273b1dfa83f97354966ce74ba780b6e8d93a4ba23d73334c7f4ee35673b2074

    • SHA512

      109e4a3b57149c5bd2447f8cf22b53a84683801357a72b7a3c4dd4b8c9f7de4d7519235714edcc3c92b3131bb6c63ca6c44d1d09097ee0ae69b27c43c03aad42

    • SSDEEP

      196608:E4xotv3Jt+M/+ZVuT7IoeF+5XrqhYgeD8SJ02:E4Sv3z+MW+Je91I

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks