General

  • Target

    69a39e4ed6186d0e4275be3e5c452f96_JaffaCakes118

  • Size

    29.3MB

  • Sample

    240523-ec5w7ada57

  • MD5

    69a39e4ed6186d0e4275be3e5c452f96

  • SHA1

    6a5c8ef8a84151928eecc8a8d7099382c82d64eb

  • SHA256

    4a851b67386c76954b3b3c666ecbc7a894cb0cf2a221f1abc5fd11602ebb7269

  • SHA512

    b26dd6aa3df977dc17e5638be64b67d5115c9cfe0275873758654adf0196a404ec57205c13ba5e714bec2cb34143ac7d73c86c68a8a2f61fb652dba740806f74

  • SSDEEP

    786432:44Mz+eo3F/3Ewvq1frVcpwwKvyXayWQ0QPyo+0:LMiesFMwvfkvybVP+0

Malware Config

Targets

    • Target

      69a39e4ed6186d0e4275be3e5c452f96_JaffaCakes118

    • Size

      29.3MB

    • MD5

      69a39e4ed6186d0e4275be3e5c452f96

    • SHA1

      6a5c8ef8a84151928eecc8a8d7099382c82d64eb

    • SHA256

      4a851b67386c76954b3b3c666ecbc7a894cb0cf2a221f1abc5fd11602ebb7269

    • SHA512

      b26dd6aa3df977dc17e5638be64b67d5115c9cfe0275873758654adf0196a404ec57205c13ba5e714bec2cb34143ac7d73c86c68a8a2f61fb652dba740806f74

    • SSDEEP

      786432:44Mz+eo3F/3Ewvq1frVcpwwKvyXayWQ0QPyo+0:LMiesFMwvfkvybVP+0

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.