General

  • Target

    65b755e72550bb880a4f9c718b17352a_JaffaCakes118

  • Size

    2.9MB

  • Sample

    240522-c3xmdshf44

  • MD5

    65b755e72550bb880a4f9c718b17352a

  • SHA1

    e5a925e84d648bf9656402aeefa91ffb33ebbc9c

  • SHA256

    03d5d9906a262608c7ed8bbe5992f4746396894883beeb1f80e4dfa9d3683e4b

  • SHA512

    77005b8e1794ecd83775fcf51bb7d02ddc6540021400a52949a34ea20ab2cf0fbeeb34532eebcb520519d3253b5cf1aec0c06df630db9d299d0b7961386a8e73

  • SSDEEP

    49152:qI4vM4aV0NRSZgrsmGuunLlsfRud6WGc+q0K7ONALHdVQBnVNQqmS5:Z2YW7wuunLls8dZGduTfoVVR

Malware Config

Targets

    • Target

      65b755e72550bb880a4f9c718b17352a_JaffaCakes118

    • Size

      2.9MB

    • MD5

      65b755e72550bb880a4f9c718b17352a

    • SHA1

      e5a925e84d648bf9656402aeefa91ffb33ebbc9c

    • SHA256

      03d5d9906a262608c7ed8bbe5992f4746396894883beeb1f80e4dfa9d3683e4b

    • SHA512

      77005b8e1794ecd83775fcf51bb7d02ddc6540021400a52949a34ea20ab2cf0fbeeb34532eebcb520519d3253b5cf1aec0c06df630db9d299d0b7961386a8e73

    • SSDEEP

      49152:qI4vM4aV0NRSZgrsmGuunLlsfRud6WGc+q0K7ONALHdVQBnVNQqmS5:Z2YW7wuunLls8dZGduTfoVVR

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks