General

  • Target

    6a2f17b95055ee30f06eb0309fa20a1e_JaffaCakes118

  • Size

    15.5MB

  • Sample

    240523-h8ml9shd7z

  • MD5

    6a2f17b95055ee30f06eb0309fa20a1e

  • SHA1

    fefac3e4a69f77bdf2b8a5f2723812fdb334362c

  • SHA256

    582566776ce64bc513bf692f65116dfe3b89395c7d14e0f47e8eb524dbcb4cdd

  • SHA512

    01ce851762e45977b7301c53147b1bb6f4fe3c2ea9356c62bd825c1fb9c7d60d9d67c47510c487482de7dbbffb2ff9795d3c210e65d2b0bf69068415b81512bb

  • SSDEEP

    393216:+uM1OFl/ZlEIhB0PbZzbwcZGI7NnS4CZv2+1:+uMML/ZllhB0xbBvOec

Malware Config

Targets

    • Target

      6a2f17b95055ee30f06eb0309fa20a1e_JaffaCakes118

    • Size

      15.5MB

    • MD5

      6a2f17b95055ee30f06eb0309fa20a1e

    • SHA1

      fefac3e4a69f77bdf2b8a5f2723812fdb334362c

    • SHA256

      582566776ce64bc513bf692f65116dfe3b89395c7d14e0f47e8eb524dbcb4cdd

    • SHA512

      01ce851762e45977b7301c53147b1bb6f4fe3c2ea9356c62bd825c1fb9c7d60d9d67c47510c487482de7dbbffb2ff9795d3c210e65d2b0bf69068415b81512bb

    • SSDEEP

      393216:+uM1OFl/ZlEIhB0PbZzbwcZGI7NnS4CZv2+1:+uMML/ZllhB0xbBvOec

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Matrix

Tasks