General

  • Target

    627aad378256719d1898e841f6677b27_JaffaCakes118

  • Size

    17.9MB

  • Sample

    240521-h54flsch4t

  • MD5

    627aad378256719d1898e841f6677b27

  • SHA1

    917bb018a619b2b85c4c9b681347643f6d6a2e08

  • SHA256

    44911daf3d8f34b7f49079ed7c61591da3478a8f4361eeba9f6651652a9f321e

  • SHA512

    3060689d3ec0ac1f909c7a1db71376ccb0b3c2a1449d21cf2391b0cadba7cda4d89d2a467e2df34a14cd9cf5d037aa11d012441ff1fdcf7c1fa4b1bff0dde9ad

  • SSDEEP

    393216:hm8Qo8W+9U1X2iksOOUD0v31YnfUdS29wMM1dMkfP8rqrKk5VpptZbahStboIcLu:g28pGX2TsOqPSfsr99NrqOetpahSxoI5

Malware Config

Targets

    • Target

      627aad378256719d1898e841f6677b27_JaffaCakes118

    • Size

      17.9MB

    • MD5

      627aad378256719d1898e841f6677b27

    • SHA1

      917bb018a619b2b85c4c9b681347643f6d6a2e08

    • SHA256

      44911daf3d8f34b7f49079ed7c61591da3478a8f4361eeba9f6651652a9f321e

    • SHA512

      3060689d3ec0ac1f909c7a1db71376ccb0b3c2a1449d21cf2391b0cadba7cda4d89d2a467e2df34a14cd9cf5d037aa11d012441ff1fdcf7c1fa4b1bff0dde9ad

    • SSDEEP

      393216:hm8Qo8W+9U1X2iksOOUD0v31YnfUdS29wMM1dMkfP8rqrKk5VpptZbahStboIcLu:g28pGX2TsOqPSfsr99NrqOetpahSxoI5

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks