General

  • Target

    534fc1140582baddf06bcd2314bac332_JaffaCakes118

  • Size

    11.8MB

  • Sample

    240518-gw5rmsfb3s

  • MD5

    534fc1140582baddf06bcd2314bac332

  • SHA1

    5aebb2740ba1c07cafcc5134e398e69b9c7f10f7

  • SHA256

    c942e9a5bfc445cf82786287f9631f3e659d9b96f3f66a0025acede35571716b

  • SHA512

    52c1b52e7d4228613825255f95c183d1e82be37cacbab3abdc72d61ad03185fb80afa3c26811da4af813e2cd10a8fa09306b42c1073fb2cdceebe384ab7c91e8

  • SSDEEP

    196608:JQlK5DCv0vom7Ec5mnhhNb+sFOL7WZAYIG0EdOfc+2wgS5oH20hPiLdb/JNCO:JQaDC8Q7cShNb9tifFhmHDhPqNz

Malware Config

Targets

    • Target

      534fc1140582baddf06bcd2314bac332_JaffaCakes118

    • Size

      11.8MB

    • MD5

      534fc1140582baddf06bcd2314bac332

    • SHA1

      5aebb2740ba1c07cafcc5134e398e69b9c7f10f7

    • SHA256

      c942e9a5bfc445cf82786287f9631f3e659d9b96f3f66a0025acede35571716b

    • SHA512

      52c1b52e7d4228613825255f95c183d1e82be37cacbab3abdc72d61ad03185fb80afa3c26811da4af813e2cd10a8fa09306b42c1073fb2cdceebe384ab7c91e8

    • SSDEEP

      196608:JQlK5DCv0vom7Ec5mnhhNb+sFOL7WZAYIG0EdOfc+2wgS5oH20hPiLdb/JNCO:JQaDC8Q7cShNb9tifFhmHDhPqNz

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks