General

  • Target

    58215099cad0bd0ec85c7e3b6fa9fe5f_JaffaCakes118

  • Size

    18.6MB

  • Sample

    240519-c2b93aec22

  • MD5

    58215099cad0bd0ec85c7e3b6fa9fe5f

  • SHA1

    2d90370254859bd447f5589db66d06d44f94e553

  • SHA256

    49cfd2c0926384b10cda2175dd81acedb0aacdd4eecffb2fd06451eb19cd36bc

  • SHA512

    d657a1f5013f19026a991601cee4342c7d717649f5b232c54a4a22e885e3d9c8219eaee4b18b7e212701f04ba8c4645c8e782d2b6e4f3e3fa74d9ebe2ef3f610

  • SSDEEP

    393216:LiC120xO6u0+ccQs5kY3ZXq94S0ld3ru8TPmeFKsa3r:LiC19sDckL3ZXq9yddTPmeFKs0

Malware Config

Targets

    • Target

      58215099cad0bd0ec85c7e3b6fa9fe5f_JaffaCakes118

    • Size

      18.6MB

    • MD5

      58215099cad0bd0ec85c7e3b6fa9fe5f

    • SHA1

      2d90370254859bd447f5589db66d06d44f94e553

    • SHA256

      49cfd2c0926384b10cda2175dd81acedb0aacdd4eecffb2fd06451eb19cd36bc

    • SHA512

      d657a1f5013f19026a991601cee4342c7d717649f5b232c54a4a22e885e3d9c8219eaee4b18b7e212701f04ba8c4645c8e782d2b6e4f3e3fa74d9ebe2ef3f610

    • SSDEEP

      393216:LiC120xO6u0+ccQs5kY3ZXq94S0ld3ru8TPmeFKsa3r:LiC19sDckL3ZXq9yddTPmeFKs0

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks