General

  • Target

    66d4f58fc8a6436c385a9f36869e67c5_JaffaCakes118

  • Size

    8.8MB

  • Sample

    240522-lp49raah58

  • MD5

    66d4f58fc8a6436c385a9f36869e67c5

  • SHA1

    2f11a711643a3962b6e129486ed915e3658d26f0

  • SHA256

    afef73f159e1c892bf1e5cbeaa4d3fc7f50c2f9acb787f2172feae0ee2ff2172

  • SHA512

    085522b8516baa00fe05173777f69093affacc2fa728a25f5951ee9bb1cf1dd8a2e01f421aac0fe81fd74a077681d45868ad509c9e7467d116f4a05dd422f401

  • SSDEEP

    196608:RutIy9+84h/Vj6odYbGSkYrktdaudMxwaRli1bKPi655/p+Gbpi:+J9t4h/Vj6HkYAt0udraRh17Uh

Malware Config

Targets

    • Target

      66d4f58fc8a6436c385a9f36869e67c5_JaffaCakes118

    • Size

      8.8MB

    • MD5

      66d4f58fc8a6436c385a9f36869e67c5

    • SHA1

      2f11a711643a3962b6e129486ed915e3658d26f0

    • SHA256

      afef73f159e1c892bf1e5cbeaa4d3fc7f50c2f9acb787f2172feae0ee2ff2172

    • SHA512

      085522b8516baa00fe05173777f69093affacc2fa728a25f5951ee9bb1cf1dd8a2e01f421aac0fe81fd74a077681d45868ad509c9e7467d116f4a05dd422f401

    • SSDEEP

      196608:RutIy9+84h/Vj6odYbGSkYrktdaudMxwaRli1bKPi655/p+Gbpi:+J9t4h/Vj6HkYAt0udraRh17Uh

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Matrix

Tasks