General

  • Target

    698a11b427f9559a09df6f9cc646c929_JaffaCakes118

  • Size

    1.8MB

  • Sample

    240523-dl53wabh33

  • MD5

    698a11b427f9559a09df6f9cc646c929

  • SHA1

    57755b5d1e5e8dae58f7f465f82c0c4364040786

  • SHA256

    31fe15d410ab571960a9fa11aa94af261b5f8a7c76b5a5b9516cf10ee9c7919c

  • SHA512

    01bbe4cd6673ce3f3f18c73223aff631063a1cd73d189ec377a32d5def2a08998972b306ce2ba8ead2985eb9c44edc5ad3d17bde9b1be27f4f3d8af592bd91e8

  • SSDEEP

    24576:iveoDlmdNt9ZuxY3R8zJiyaparH6gdiGVuQEllMV9MzxtpZLrfmkaRpKU:iveoDlmdPu2CYyaparLPVN+m0bNeLpKU

Malware Config

Targets

    • Target

      698a11b427f9559a09df6f9cc646c929_JaffaCakes118

    • Size

      1.8MB

    • MD5

      698a11b427f9559a09df6f9cc646c929

    • SHA1

      57755b5d1e5e8dae58f7f465f82c0c4364040786

    • SHA256

      31fe15d410ab571960a9fa11aa94af261b5f8a7c76b5a5b9516cf10ee9c7919c

    • SHA512

      01bbe4cd6673ce3f3f18c73223aff631063a1cd73d189ec377a32d5def2a08998972b306ce2ba8ead2985eb9c44edc5ad3d17bde9b1be27f4f3d8af592bd91e8

    • SSDEEP

      24576:iveoDlmdNt9ZuxY3R8zJiyaparH6gdiGVuQEllMV9MzxtpZLrfmkaRpKU:iveoDlmdPu2CYyaparLPVN+m0bNeLpKU

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Matrix

Tasks