General

  • Target

    66f3d2c50d20ec1fceaef6efcfc93eda_JaffaCakes118

  • Size

    30.9MB

  • Sample

    240522-mjmyysbh48

  • MD5

    66f3d2c50d20ec1fceaef6efcfc93eda

  • SHA1

    0e6fca934f329cf7531e72de91fa50f83a777326

  • SHA256

    8268a7e3ca738deb9341d7dd3beba940c95af5223b10e732f1ef8a6184aa690c

  • SHA512

    1f81e1807a4151de714156f0fbc40b45e483985b65b6fd4440a41b73bf123198850db4472694a2fd17f675f1fc41ce2d53c81b70d455777f35e32b7eca7ab25d

  • SSDEEP

    786432:foTcVC1QQhRdwlSbr6oLgGhzMNbM6wCzMNbn9P5TJSjpSuF+y:rOdhLwlSbr57h+aC+F5TcQNy

Malware Config

Targets

    • Target

      66f3d2c50d20ec1fceaef6efcfc93eda_JaffaCakes118

    • Size

      30.9MB

    • MD5

      66f3d2c50d20ec1fceaef6efcfc93eda

    • SHA1

      0e6fca934f329cf7531e72de91fa50f83a777326

    • SHA256

      8268a7e3ca738deb9341d7dd3beba940c95af5223b10e732f1ef8a6184aa690c

    • SHA512

      1f81e1807a4151de714156f0fbc40b45e483985b65b6fd4440a41b73bf123198850db4472694a2fd17f675f1fc41ce2d53c81b70d455777f35e32b7eca7ab25d

    • SSDEEP

      786432:foTcVC1QQhRdwlSbr6oLgGhzMNbM6wCzMNbn9P5TJSjpSuF+y:rOdhLwlSbr57h+aC+F5TcQNy

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Matrix

Tasks