General

  • Target

    6918e88e806ca1f2348d2bf4c53f5de5_JaffaCakes118

  • Size

    15.4MB

  • Sample

    240523-af3tsaed54

  • MD5

    6918e88e806ca1f2348d2bf4c53f5de5

  • SHA1

    575709567f9f71f15e9a1a17decd199ef32a80ea

  • SHA256

    5ee2767c20786516cf30caee9afa3b05d13934a803920f8d3683f2e198d5b213

  • SHA512

    9f467d33cfbda9d0167fe89e296bf6b6927f7f471bff98ef0ab00e98cd5c7a47021109e5f88e71adb2d23d374bf39fbda740fd8a5611bffb0d45a0a6a74604f3

  • SSDEEP

    393216:ApqaT+GPLPzyhEyBrLsaw9zHkUrjAdRcEAUzB:qqaKkrUrcRw/hrd

Malware Config

Targets

    • Target

      6918e88e806ca1f2348d2bf4c53f5de5_JaffaCakes118

    • Size

      15.4MB

    • MD5

      6918e88e806ca1f2348d2bf4c53f5de5

    • SHA1

      575709567f9f71f15e9a1a17decd199ef32a80ea

    • SHA256

      5ee2767c20786516cf30caee9afa3b05d13934a803920f8d3683f2e198d5b213

    • SHA512

      9f467d33cfbda9d0167fe89e296bf6b6927f7f471bff98ef0ab00e98cd5c7a47021109e5f88e71adb2d23d374bf39fbda740fd8a5611bffb0d45a0a6a74604f3

    • SSDEEP

      393216:ApqaT+GPLPzyhEyBrLsaw9zHkUrjAdRcEAUzB:qqaKkrUrcRw/hrd

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks