General

  • Target

    68a43ab8387c5ed0d4a9bfd89d2e18af_JaffaCakes118

  • Size

    21.4MB

  • Sample

    240522-zynj9agf8y

  • MD5

    68a43ab8387c5ed0d4a9bfd89d2e18af

  • SHA1

    9b9ddd583cb7c2dd392905f3aac0c899ead24578

  • SHA256

    2a508361766d99e7855308851841046f34e373ecd3e4ca092301dd28ded9766e

  • SHA512

    109c216e0133ba9ee98a7ef69c0bb84e3479169ff8a034f5556bd9b44b1a3fbf264c17bb06516e0bb828f3b9341f30b38b308f670890d39cd0e61ec0d01ec29f

  • SSDEEP

    393216:4CR09tbib9GSrS4KjBeCFJyDk76ULw796Um14Xn6Xj/4uoVwCv5q/u18yjV2:4CR09tbibUSrClTIULWXEMVwW5qW13jk

Malware Config

Targets

    • Target

      68a43ab8387c5ed0d4a9bfd89d2e18af_JaffaCakes118

    • Size

      21.4MB

    • MD5

      68a43ab8387c5ed0d4a9bfd89d2e18af

    • SHA1

      9b9ddd583cb7c2dd392905f3aac0c899ead24578

    • SHA256

      2a508361766d99e7855308851841046f34e373ecd3e4ca092301dd28ded9766e

    • SHA512

      109c216e0133ba9ee98a7ef69c0bb84e3479169ff8a034f5556bd9b44b1a3fbf264c17bb06516e0bb828f3b9341f30b38b308f670890d39cd0e61ec0d01ec29f

    • SSDEEP

      393216:4CR09tbib9GSrS4KjBeCFJyDk76ULw796Um14Xn6Xj/4uoVwCv5q/u18yjV2:4CR09tbibUSrClTIULWXEMVwW5qW13jk

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Matrix

Tasks