General

  • Target

    610388df0b36470f51fa99041964e90a_JaffaCakes118

  • Size

    9.9MB

  • Sample

    240520-y5qgrafg35

  • MD5

    610388df0b36470f51fa99041964e90a

  • SHA1

    0aec549fff178553781b57046edd93436764fe47

  • SHA256

    a76e6fe207dc4235bda4933373150af2b9b21b0cac4d28ca05ff5f3aa6e433ea

  • SHA512

    5d0b1dd1dbfbd9325d97cef341b99cda8eaaf9a570edeb11cc0134322632a3ed6cc649a8ead4d71736e23f017722db9997766ff3b540def3108ceac1dc1b60cd

  • SSDEEP

    196608:HrFTQs+NHa9rItuo69OyUnQg7iHa+fxL0cFT38orsXunrEmi6Gzo0Ke3brp:J59EcfwyU/+dfW+nrEmpXe3J

Malware Config

Targets

    • Target

      610388df0b36470f51fa99041964e90a_JaffaCakes118

    • Size

      9.9MB

    • MD5

      610388df0b36470f51fa99041964e90a

    • SHA1

      0aec549fff178553781b57046edd93436764fe47

    • SHA256

      a76e6fe207dc4235bda4933373150af2b9b21b0cac4d28ca05ff5f3aa6e433ea

    • SHA512

      5d0b1dd1dbfbd9325d97cef341b99cda8eaaf9a570edeb11cc0134322632a3ed6cc649a8ead4d71736e23f017722db9997766ff3b540def3108ceac1dc1b60cd

    • SSDEEP

      196608:HrFTQs+NHa9rItuo69OyUnQg7iHa+fxL0cFT38orsXunrEmi6Gzo0Ke3brp:J59EcfwyU/+dfW+nrEmpXe3J

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks