General

  • Target

    69e0d9ef3b269831ac7cf2370ee17497_JaffaCakes118

  • Size

    11.6MB

  • Sample

    240523-f41xzsfb5y

  • MD5

    69e0d9ef3b269831ac7cf2370ee17497

  • SHA1

    ca6a6a592d41e635c7ef098942601048f8e27a2d

  • SHA256

    1411e31852dbe7bd2dafec671048e2f81c342f7201245a27ad7f12875eac82cd

  • SHA512

    94ae61e24e461aafd77a37700af0e2695af108f306ffb28af65500197bc73f9ec366caa4313d2ee1d543c98c6afb6d369be55dd272a0ade6a97ce5fef7966aae

  • SSDEEP

    196608:dDxogxNF6/5f4ylOPpumK+I6/8ii42Ph6i2fLF7dh+CXfsYYuJB4UK56:dlhNF66LEmE6/8H42ALFaCX0Juf4A

Malware Config

Targets

    • Target

      69e0d9ef3b269831ac7cf2370ee17497_JaffaCakes118

    • Size

      11.6MB

    • MD5

      69e0d9ef3b269831ac7cf2370ee17497

    • SHA1

      ca6a6a592d41e635c7ef098942601048f8e27a2d

    • SHA256

      1411e31852dbe7bd2dafec671048e2f81c342f7201245a27ad7f12875eac82cd

    • SHA512

      94ae61e24e461aafd77a37700af0e2695af108f306ffb28af65500197bc73f9ec366caa4313d2ee1d543c98c6afb6d369be55dd272a0ade6a97ce5fef7966aae

    • SSDEEP

      196608:dDxogxNF6/5f4ylOPpumK+I6/8ii42Ph6i2fLF7dh+CXfsYYuJB4UK56:dlhNF66LEmE6/8H42ALFaCX0Juf4A

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Matrix

Tasks