General

  • Target

    66728d4870dcbbd23c4637aac98ba562_JaffaCakes118

  • Size

    23.2MB

  • Sample

    240522-h5q6aaga63

  • MD5

    66728d4870dcbbd23c4637aac98ba562

  • SHA1

    52030fe752292a61def4e8c48e91ae5aaac2fd62

  • SHA256

    b15b1dd0217968a739ac4ab939ca96ae6a85b4f6521bdd1822ff06c5889a639c

  • SHA512

    ae18b15514dab9df11cc5721b3eb6aee975acaf8400e000d6858b69a820e1738d0fec981e41ffd2ebc6c603e76305e35c620808154010d66d06046f6b0d7e6f5

  • SSDEEP

    393216:HZptqx8eq8QNCae3yO9yrtXCe3YZiyf3MXJPYr+Atm89OfVJv2xjKo3cj:HBqxRlRCCyrtXCigZUX2aam8EfVJux+b

Malware Config

Targets

    • Target

      66728d4870dcbbd23c4637aac98ba562_JaffaCakes118

    • Size

      23.2MB

    • MD5

      66728d4870dcbbd23c4637aac98ba562

    • SHA1

      52030fe752292a61def4e8c48e91ae5aaac2fd62

    • SHA256

      b15b1dd0217968a739ac4ab939ca96ae6a85b4f6521bdd1822ff06c5889a639c

    • SHA512

      ae18b15514dab9df11cc5721b3eb6aee975acaf8400e000d6858b69a820e1738d0fec981e41ffd2ebc6c603e76305e35c620808154010d66d06046f6b0d7e6f5

    • SSDEEP

      393216:HZptqx8eq8QNCae3yO9yrtXCe3YZiyf3MXJPYr+Atm89OfVJv2xjKo3cj:HBqxRlRCCyrtXCigZUX2aam8EfVJux+b

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks