General

  • Target

    6701a6808dfdf07b14605994c487b285_JaffaCakes118

  • Size

    16.0MB

  • Sample

    240522-mxn36scd2w

  • MD5

    6701a6808dfdf07b14605994c487b285

  • SHA1

    b6341847488bfe4c4632ed6011d8d3e291dfdfaf

  • SHA256

    133a588b93ab1d6f267443097d750a96017257cde6e0609ec30e3405eef68927

  • SHA512

    52f7495ed4fc0a7273511e31b40dfebc9ca6f15ca393018a923744ca483ab21f9d6ae98008503f4b7eac03a4863f16a0c7b739e4bb6cec1238f195275f8d2797

  • SSDEEP

    393216:a5MFAtDQNsPtVHEx0ld3QVQIe8wKoYCl5X:LOQ+VH3QKIetKo5l1

Malware Config

Targets

    • Target

      6701a6808dfdf07b14605994c487b285_JaffaCakes118

    • Size

      16.0MB

    • MD5

      6701a6808dfdf07b14605994c487b285

    • SHA1

      b6341847488bfe4c4632ed6011d8d3e291dfdfaf

    • SHA256

      133a588b93ab1d6f267443097d750a96017257cde6e0609ec30e3405eef68927

    • SHA512

      52f7495ed4fc0a7273511e31b40dfebc9ca6f15ca393018a923744ca483ab21f9d6ae98008503f4b7eac03a4863f16a0c7b739e4bb6cec1238f195275f8d2797

    • SSDEEP

      393216:a5MFAtDQNsPtVHEx0ld3QVQIe8wKoYCl5X:LOQ+VH3QKIetKo5l1

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks