General

  • Target

    663d1b7e769fc3790b79737aebb96c43_JaffaCakes118

  • Size

    29.8MB

  • Sample

    240522-gpt2kaee2z

  • MD5

    663d1b7e769fc3790b79737aebb96c43

  • SHA1

    6af85a20fe22abf822b66e1477d311d936febe08

  • SHA256

    8381df7f68147869dca90e1e815ed88fc60ce95595537c71a4e78e20d608fa46

  • SHA512

    7d47e9803d4662d845305245e8ceb5c9fec93fdae827589d75974d5981ce2a0d8db11710410b113af812a12d74a7d076c0bb3eb13e9d8e9f5b817c5d83af3527

  • SSDEEP

    786432:zf542qY2mb7SO6KsYdNuBhDBIsPZj2WTl5ZrAZQbWigEh+I9PVH:zfV/nbuO6SehD+OZjfTZA/nI9PVH

Malware Config

Targets

    • Target

      663d1b7e769fc3790b79737aebb96c43_JaffaCakes118

    • Size

      29.8MB

    • MD5

      663d1b7e769fc3790b79737aebb96c43

    • SHA1

      6af85a20fe22abf822b66e1477d311d936febe08

    • SHA256

      8381df7f68147869dca90e1e815ed88fc60ce95595537c71a4e78e20d608fa46

    • SHA512

      7d47e9803d4662d845305245e8ceb5c9fec93fdae827589d75974d5981ce2a0d8db11710410b113af812a12d74a7d076c0bb3eb13e9d8e9f5b817c5d83af3527

    • SSDEEP

      786432:zf542qY2mb7SO6KsYdNuBhDBIsPZj2WTl5ZrAZQbWigEh+I9PVH:zfV/nbuO6SehD+OZjfTZA/nI9PVH

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks