General

  • Target

    676d2afcc96e0c7576d36e71dd850aa9_JaffaCakes118

  • Size

    5.9MB

  • Sample

    240522-qsqmzsdb92

  • MD5

    676d2afcc96e0c7576d36e71dd850aa9

  • SHA1

    59bf286bfa92bfb028f6a5705cbed9eda558bcc2

  • SHA256

    ec195c6b415ce535c92a704b47dbc0a26ed7a6bf6bc7980edbc1573092dc74c1

  • SHA512

    302a5f28c71b69948421ab89617c6fb0517cf67a227e4bb67823af272d876afa1b5472ac5a49c5a2d982f5add1ad3bfcf5b8bec685167d8bd1ba87957cc98f39

  • SSDEEP

    98304:xMP5sNM0K8kJcdN4n4CCA4WOjw66L6eWwFVMp2ugyZsPBcyzmglhiC8g:uPcMPBu3xA4fjw66ZlFaIf2Fglhf9

Malware Config

Targets

    • Target

      676d2afcc96e0c7576d36e71dd850aa9_JaffaCakes118

    • Size

      5.9MB

    • MD5

      676d2afcc96e0c7576d36e71dd850aa9

    • SHA1

      59bf286bfa92bfb028f6a5705cbed9eda558bcc2

    • SHA256

      ec195c6b415ce535c92a704b47dbc0a26ed7a6bf6bc7980edbc1573092dc74c1

    • SHA512

      302a5f28c71b69948421ab89617c6fb0517cf67a227e4bb67823af272d876afa1b5472ac5a49c5a2d982f5add1ad3bfcf5b8bec685167d8bd1ba87957cc98f39

    • SSDEEP

      98304:xMP5sNM0K8kJcdN4n4CCA4WOjw66L6eWwFVMp2ugyZsPBcyzmglhiC8g:uPcMPBu3xA4fjw66ZlFaIf2Fglhf9

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Matrix

Tasks