General

  • Target

    55259564c9321d32b249c4afd162eefd_JaffaCakes118

  • Size

    7.3MB

  • Sample

    240518-rmgcssfd6x

  • MD5

    55259564c9321d32b249c4afd162eefd

  • SHA1

    14d85319652f9047cd4dd2569a78bbf9c81b2709

  • SHA256

    96fb8b8d23e69239bf2ce04b6dc122c476e7b20d735aa24cff153803cfc4c6f4

  • SHA512

    0cf0611bb8b73ad6e74c12c96a1333d9161ee48e12bf3c17c5df0deb7ad96d4bf9acac8897ca9cfa6e8ee14c2fa1671003638490e558a434ef3226beac3887b1

  • SSDEEP

    98304:vk0L5nCNdy3W4T7rUivk6TaHohd7tz1kgfOuIx2A7/8ds:vk0lygdPUivk8iohdrsx2G/os

Malware Config

Targets

    • Target

      55259564c9321d32b249c4afd162eefd_JaffaCakes118

    • Size

      7.3MB

    • MD5

      55259564c9321d32b249c4afd162eefd

    • SHA1

      14d85319652f9047cd4dd2569a78bbf9c81b2709

    • SHA256

      96fb8b8d23e69239bf2ce04b6dc122c476e7b20d735aa24cff153803cfc4c6f4

    • SHA512

      0cf0611bb8b73ad6e74c12c96a1333d9161ee48e12bf3c17c5df0deb7ad96d4bf9acac8897ca9cfa6e8ee14c2fa1671003638490e558a434ef3226beac3887b1

    • SSDEEP

      98304:vk0L5nCNdy3W4T7rUivk6TaHohd7tz1kgfOuIx2A7/8ds:vk0lygdPUivk8iohdrsx2G/os

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks