General

  • Target

    64779abd1c8540735a11d4749e36bb84_JaffaCakes118

  • Size

    8.9MB

  • Sample

    240521-x22vyafg9w

  • MD5

    64779abd1c8540735a11d4749e36bb84

  • SHA1

    fdf853944376cc8073839a34e3444ba3b767f7b7

  • SHA256

    24a56bfe72cd34ab12a9c3d1c02c5ce0068581cd83fc01e54fb6029dcfd90590

  • SHA512

    015085978de78d134f6947cc2ce6994dc569509c473f26c59874a94bdd6fac51420b484cce41d1659acd4b3ef946db41ab79c9abdb3777603694262c25d89ada

  • SSDEEP

    196608:NZAaGowVP8djneDiBc9YpDuk70hADh0DeIA52/IeB4UoYFI3:NydoWWeDiC9uD8yhQ9A52/IeB4UoYS

Malware Config

Targets

    • Target

      64779abd1c8540735a11d4749e36bb84_JaffaCakes118

    • Size

      8.9MB

    • MD5

      64779abd1c8540735a11d4749e36bb84

    • SHA1

      fdf853944376cc8073839a34e3444ba3b767f7b7

    • SHA256

      24a56bfe72cd34ab12a9c3d1c02c5ce0068581cd83fc01e54fb6029dcfd90590

    • SHA512

      015085978de78d134f6947cc2ce6994dc569509c473f26c59874a94bdd6fac51420b484cce41d1659acd4b3ef946db41ab79c9abdb3777603694262c25d89ada

    • SSDEEP

      196608:NZAaGowVP8djneDiBc9YpDuk70hADh0DeIA52/IeB4UoYFI3:NydoWWeDiC9uD8yhQ9A52/IeB4UoYS

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks