General

  • Target

    692cff3b40928e45c654ac9675abf3f7_JaffaCakes118

  • Size

    24.5MB

  • Sample

    240523-a1qpysfa8y

  • MD5

    692cff3b40928e45c654ac9675abf3f7

  • SHA1

    cddd223a2740ff3a23a94c4c058c88853b7d4c58

  • SHA256

    6d0ce6305e977d28ba4e7bac35de605151a8c22968b71150459bae70ecbd58c9

  • SHA512

    cd4c6324fbc362e3553e13138ecd045c28b9068defad47b46392c05d3ed7fba4440fed1100128f9a720093e68ad866859fa3de56a472e4dbc43b36f81f5e5f15

  • SSDEEP

    393216:zSYKBXFNW4CX11z3fyh9z9LJfivE7aakUVfflX40SonP:OPRmbl1zqbz9ZqE2XSoCP

Malware Config

Targets

    • Target

      692cff3b40928e45c654ac9675abf3f7_JaffaCakes118

    • Size

      24.5MB

    • MD5

      692cff3b40928e45c654ac9675abf3f7

    • SHA1

      cddd223a2740ff3a23a94c4c058c88853b7d4c58

    • SHA256

      6d0ce6305e977d28ba4e7bac35de605151a8c22968b71150459bae70ecbd58c9

    • SHA512

      cd4c6324fbc362e3553e13138ecd045c28b9068defad47b46392c05d3ed7fba4440fed1100128f9a720093e68ad866859fa3de56a472e4dbc43b36f81f5e5f15

    • SSDEEP

      393216:zSYKBXFNW4CX11z3fyh9z9LJfivE7aakUVfflX40SonP:OPRmbl1zqbz9ZqE2XSoCP

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks