General

  • Target

    66c297922e1a5179b99bf81b1bd9d492_JaffaCakes118

  • Size

    28.6MB

  • Sample

    240522-k7fhnsae2s

  • MD5

    66c297922e1a5179b99bf81b1bd9d492

  • SHA1

    651d39d9e12b009dbdc000889325c979d0c4b9e7

  • SHA256

    c3b38aa9cfa03ca08c7a094e6d59686b57da674437536ab2ae05e7322792f374

  • SHA512

    7cbd3fb1df12e72f237997b5e339c5e01d1264cce5ae3b5a6984c2c9c43e3f249e12fb5f176495ab82e9348d13b1e8994d23ad0ea6a0fbf2475cfe3a60c07e46

  • SSDEEP

    786432:cerK5FNwrhcZIMu28D6q4AQfWPFWrG0/zVu4erRFIFx:7rKwl/Mu28D61AQfWArG0/zzx

Malware Config

Targets

    • Target

      66c297922e1a5179b99bf81b1bd9d492_JaffaCakes118

    • Size

      28.6MB

    • MD5

      66c297922e1a5179b99bf81b1bd9d492

    • SHA1

      651d39d9e12b009dbdc000889325c979d0c4b9e7

    • SHA256

      c3b38aa9cfa03ca08c7a094e6d59686b57da674437536ab2ae05e7322792f374

    • SHA512

      7cbd3fb1df12e72f237997b5e339c5e01d1264cce5ae3b5a6984c2c9c43e3f249e12fb5f176495ab82e9348d13b1e8994d23ad0ea6a0fbf2475cfe3a60c07e46

    • SSDEEP

      786432:cerK5FNwrhcZIMu28D6q4AQfWPFWrG0/zVu4erRFIFx:7rKwl/Mu28D61AQfWArG0/zzx

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks