General

  • Target

    67e2133fd6088603242c8e15d4110efb_JaffaCakes118

  • Size

    19.8MB

  • Sample

    240522-tx6rjshb5x

  • MD5

    67e2133fd6088603242c8e15d4110efb

  • SHA1

    97d4bb420b6de993ede52f9e09244aca62700e8f

  • SHA256

    a8520cb8e1f421574928afa24e5e6a5d2e1d8637cc35b1501bcc887e38e8ed20

  • SHA512

    6319802444ddfce3148e14e9dd0421428e86f5388e928fb071604310ee123ab262c1ed3b12c52db95575064f1a34acd1f4d04577394443ee97571d1a98a022f6

  • SSDEEP

    393216:Nlc6/YieGvabeJdSyHxEk66T9guEYYuKHeamYsbi7ul8sUiIu2nFPVe:fh/YieGvQeJdSVkj9y3Vs+6l8sZZ2nFA

Malware Config

Targets

    • Target

      67e2133fd6088603242c8e15d4110efb_JaffaCakes118

    • Size

      19.8MB

    • MD5

      67e2133fd6088603242c8e15d4110efb

    • SHA1

      97d4bb420b6de993ede52f9e09244aca62700e8f

    • SHA256

      a8520cb8e1f421574928afa24e5e6a5d2e1d8637cc35b1501bcc887e38e8ed20

    • SHA512

      6319802444ddfce3148e14e9dd0421428e86f5388e928fb071604310ee123ab262c1ed3b12c52db95575064f1a34acd1f4d04577394443ee97571d1a98a022f6

    • SSDEEP

      393216:Nlc6/YieGvabeJdSyHxEk66T9guEYYuKHeamYsbi7ul8sUiIu2nFPVe:fh/YieGvQeJdSVkj9y3Vs+6l8sZZ2nFA

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks