General

  • Target

    6a45c5ed1aad37ca45b47dfea646550d_JaffaCakes118

  • Size

    10.0MB

  • Sample

    240523-jv5rcsab8z

  • MD5

    6a45c5ed1aad37ca45b47dfea646550d

  • SHA1

    8a4ba55faddfc1b017da4af98490a0348957d3df

  • SHA256

    9dc48fa9f7d85d9c5d8bb7b443f1c13c5f9ee115229ac2199d73998659d239ae

  • SHA512

    8833b531613f52c4f4e2c9e082d400e6206dd938b2c44d30555477464aa4942a1fad3e2a9929ca84c343b2c1eb7ba9e28210942617a2df9a267bf7fca664251d

  • SSDEEP

    196608:l11fHT2tTsQScwzCKrhPbbWbvXYIsY3LwuISn/SlAh1IqRXwSD0pL+YjeaUz:71fojwuK1PAs2zn6lS1ZRASgkWpU

Malware Config

Targets

    • Target

      6a45c5ed1aad37ca45b47dfea646550d_JaffaCakes118

    • Size

      10.0MB

    • MD5

      6a45c5ed1aad37ca45b47dfea646550d

    • SHA1

      8a4ba55faddfc1b017da4af98490a0348957d3df

    • SHA256

      9dc48fa9f7d85d9c5d8bb7b443f1c13c5f9ee115229ac2199d73998659d239ae

    • SHA512

      8833b531613f52c4f4e2c9e082d400e6206dd938b2c44d30555477464aa4942a1fad3e2a9929ca84c343b2c1eb7ba9e28210942617a2df9a267bf7fca664251d

    • SSDEEP

      196608:l11fHT2tTsQScwzCKrhPbbWbvXYIsY3LwuISn/SlAh1IqRXwSD0pL+YjeaUz:71fojwuK1PAs2zn6lS1ZRASgkWpU

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Matrix

Tasks