General

  • Target

    6331f5c84fe283f7baf4cfe1fe5ac433_JaffaCakes118

  • Size

    21.3MB

  • Sample

    240521-n2dnnscf8z

  • MD5

    6331f5c84fe283f7baf4cfe1fe5ac433

  • SHA1

    1de3f20bc7f7849da8b5c7eac4f59ccdca48ee90

  • SHA256

    bc3a617f74196d909933383609a20e7696277c851024bd6af48b4e95ea2d32b0

  • SHA512

    89fefee26c9d5494078b7516a9c67f3b51c1f28e8992004d76bc29eb351cb50c77d995c353e9e31ceefe8a2f95ae2453e8f59afa6d26a674805e5a0f4ef77a42

  • SSDEEP

    393216:jQ0LWU9qM9plIYmcio52XKGuL71Sr32bUPrtr68YjycHCCIVLuxR4:jd/qM98ctGRcST2bUjtWUgct

Malware Config

Targets

    • Target

      6331f5c84fe283f7baf4cfe1fe5ac433_JaffaCakes118

    • Size

      21.3MB

    • MD5

      6331f5c84fe283f7baf4cfe1fe5ac433

    • SHA1

      1de3f20bc7f7849da8b5c7eac4f59ccdca48ee90

    • SHA256

      bc3a617f74196d909933383609a20e7696277c851024bd6af48b4e95ea2d32b0

    • SHA512

      89fefee26c9d5494078b7516a9c67f3b51c1f28e8992004d76bc29eb351cb50c77d995c353e9e31ceefe8a2f95ae2453e8f59afa6d26a674805e5a0f4ef77a42

    • SSDEEP

      393216:jQ0LWU9qM9plIYmcio52XKGuL71Sr32bUPrtr68YjycHCCIVLuxR4:jd/qM98ctGRcST2bUjtWUgct

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks