General

  • Target

    63e0aafdcd546b0b750e478a1ce76a8e_JaffaCakes118

  • Size

    30.2MB

  • Sample

    240521-te38psbb28

  • MD5

    63e0aafdcd546b0b750e478a1ce76a8e

  • SHA1

    729dbf1f49b6897138aa3c4e88f32f7701c301f2

  • SHA256

    5f25694a84dd08b7f941c395b840ea6eed8442043d142e006f948be68b597780

  • SHA512

    031de36abce47d9464bb6e455797b3ae74b18b32c70d0f6ff6e347952ab5c6a0c5cf6510e94ab4aca718fb53225f77c0701e82f422ab42d08d8b0f49275f9918

  • SSDEEP

    786432:lMcSDzUJRLcpAqCer9jIGRclvhkWkHzLT0Crsj72s+9P1V3gBY6Mmi6:lS0gxrx5aoWqrm2FP18Y6M6

Malware Config

Targets

    • Target

      63e0aafdcd546b0b750e478a1ce76a8e_JaffaCakes118

    • Size

      30.2MB

    • MD5

      63e0aafdcd546b0b750e478a1ce76a8e

    • SHA1

      729dbf1f49b6897138aa3c4e88f32f7701c301f2

    • SHA256

      5f25694a84dd08b7f941c395b840ea6eed8442043d142e006f948be68b597780

    • SHA512

      031de36abce47d9464bb6e455797b3ae74b18b32c70d0f6ff6e347952ab5c6a0c5cf6510e94ab4aca718fb53225f77c0701e82f422ab42d08d8b0f49275f9918

    • SSDEEP

      786432:lMcSDzUJRLcpAqCer9jIGRclvhkWkHzLT0Crsj72s+9P1V3gBY6Mmi6:lS0gxrx5aoWqrm2FP18Y6M6

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks