General

  • Target

    63e431ce1a53475121e40a8fe1de4c9c_JaffaCakes118

  • Size

    24.3MB

  • Sample

    240521-thg5msbb93

  • MD5

    63e431ce1a53475121e40a8fe1de4c9c

  • SHA1

    2cbd87ad7e211fa469cf8a5a37b7d9b16851a5a3

  • SHA256

    b7c2bacf4532fa476dbd96189e48edc7f55411cdc4a060d34fa41662a8a5aacc

  • SHA512

    d7b827096460ee55f89537afdf467237e06c347321674be478bdc635e3b0dd1e6b9a3f8304bc0504b627e0b764c1488f212dfa3b097f7ad95bca85ea838e6cd7

  • SSDEEP

    786432:fNj7sPVDkgfJUNBMjZieSwufku5VFKCwRaIk1zVDkcu6vSf:flxgakjZ/S1NwCwBk1zVDo6vSf

Malware Config

Targets

    • Target

      63e431ce1a53475121e40a8fe1de4c9c_JaffaCakes118

    • Size

      24.3MB

    • MD5

      63e431ce1a53475121e40a8fe1de4c9c

    • SHA1

      2cbd87ad7e211fa469cf8a5a37b7d9b16851a5a3

    • SHA256

      b7c2bacf4532fa476dbd96189e48edc7f55411cdc4a060d34fa41662a8a5aacc

    • SHA512

      d7b827096460ee55f89537afdf467237e06c347321674be478bdc635e3b0dd1e6b9a3f8304bc0504b627e0b764c1488f212dfa3b097f7ad95bca85ea838e6cd7

    • SSDEEP

      786432:fNj7sPVDkgfJUNBMjZieSwufku5VFKCwRaIk1zVDkcu6vSf:flxgakjZ/S1NwCwBk1zVDo6vSf

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks