General

  • Target

    54550d15f25fcebb0b47217341c0ae71_JaffaCakes118

  • Size

    18.1MB

  • Sample

    240518-mzg3msga21

  • MD5

    54550d15f25fcebb0b47217341c0ae71

  • SHA1

    b85ce95328a267b58b754f9e1f5bc54f4b669859

  • SHA256

    423a5f8908c0e8eda026ee9e9f2c58c0281c915ece391d0d80323ae1eaf4e420

  • SHA512

    a75ad046212d296eac3225f050ff199b9a0cc21a7a2aa93a6aac8e0b9a3007901853cccdbffae1f9fad7a49b19a1894985ad3bed754773eab38e2914f508fe50

  • SSDEEP

    393216:2mzKrCWTwX0BJ0MP1u3Qax2YVaw/+MssMS2yuUu0IPnfJj6t22:2mz+CoBJmGYVId30YfhUB

Malware Config

Targets

    • Target

      54550d15f25fcebb0b47217341c0ae71_JaffaCakes118

    • Size

      18.1MB

    • MD5

      54550d15f25fcebb0b47217341c0ae71

    • SHA1

      b85ce95328a267b58b754f9e1f5bc54f4b669859

    • SHA256

      423a5f8908c0e8eda026ee9e9f2c58c0281c915ece391d0d80323ae1eaf4e420

    • SHA512

      a75ad046212d296eac3225f050ff199b9a0cc21a7a2aa93a6aac8e0b9a3007901853cccdbffae1f9fad7a49b19a1894985ad3bed754773eab38e2914f508fe50

    • SSDEEP

      393216:2mzKrCWTwX0BJ0MP1u3Qax2YVaw/+MssMS2yuUu0IPnfJj6t22:2mz+CoBJmGYVId30YfhUB

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks