General

  • Target

    58eb733a1c6617149cc38d3b058d2291_JaffaCakes118

  • Size

    20.2MB

  • Sample

    240519-gt67padg6z

  • MD5

    58eb733a1c6617149cc38d3b058d2291

  • SHA1

    59aef527c89ad9d570059c9aa20f4a29f6fc789f

  • SHA256

    29927b7f682e953759f1e47aef8fffcc181e512ce52a75427582532126039808

  • SHA512

    7089ebc7d48471551e9bfb699ba6dee3eedade50db8d4a1ddcfc9d716a8243a4f7b53ad9dda6e65fda0b7a28a0eaf61e6d277dc8c177189a18a3bbe80bd29450

  • SSDEEP

    393216:mgGUl0cOZxgNJpIP+Nk8cM8mGnxU+hZSEZJ2QAb/Jyf1bHmafocfGndgxrXBn:m9m/8gNJpk+NsM8HxU+hZSEZ+Y1yafos

Malware Config

Targets

    • Target

      58eb733a1c6617149cc38d3b058d2291_JaffaCakes118

    • Size

      20.2MB

    • MD5

      58eb733a1c6617149cc38d3b058d2291

    • SHA1

      59aef527c89ad9d570059c9aa20f4a29f6fc789f

    • SHA256

      29927b7f682e953759f1e47aef8fffcc181e512ce52a75427582532126039808

    • SHA512

      7089ebc7d48471551e9bfb699ba6dee3eedade50db8d4a1ddcfc9d716a8243a4f7b53ad9dda6e65fda0b7a28a0eaf61e6d277dc8c177189a18a3bbe80bd29450

    • SSDEEP

      393216:mgGUl0cOZxgNJpIP+Nk8cM8mGnxU+hZSEZJ2QAb/Jyf1bHmafocfGndgxrXBn:m9m/8gNJpk+NsM8HxU+hZSEZ+Y1yafos

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks