General

  • Target

    661e55e6279f2922681964363f47b6f4_JaffaCakes118

  • Size

    18.9MB

  • Sample

    240522-fw4c5sdc2x

  • MD5

    661e55e6279f2922681964363f47b6f4

  • SHA1

    c8e3e7e15f35d7bc495e861f7aff341d9047a184

  • SHA256

    e73e09ed27a025e3f165a420fea3b42c866a922e4853eb8c0f96290c167a3e76

  • SHA512

    5101e7ea1682a4c3c134588d34f7a5b3ec84bffc872b7a3b424b4cd64c576ecb091abad876fc5cae4a3ce301046fb907f88196c629550287a6bb717ad600c385

  • SSDEEP

    393216:bCzMzYY7HaUYB1WauGmLFOx2KtDEngH5ehZssT/:bw86UYXN9tIngH5msC

Malware Config

Targets

    • Target

      661e55e6279f2922681964363f47b6f4_JaffaCakes118

    • Size

      18.9MB

    • MD5

      661e55e6279f2922681964363f47b6f4

    • SHA1

      c8e3e7e15f35d7bc495e861f7aff341d9047a184

    • SHA256

      e73e09ed27a025e3f165a420fea3b42c866a922e4853eb8c0f96290c167a3e76

    • SHA512

      5101e7ea1682a4c3c134588d34f7a5b3ec84bffc872b7a3b424b4cd64c576ecb091abad876fc5cae4a3ce301046fb907f88196c629550287a6bb717ad600c385

    • SSDEEP

      393216:bCzMzYY7HaUYB1WauGmLFOx2KtDEngH5ehZssT/:bw86UYXN9tIngH5msC

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks