General

  • Target

    6aa131876809cb855dd32c54efe78c52_JaffaCakes118

  • Size

    10.3MB

  • Sample

    240523-meszeada49

  • MD5

    6aa131876809cb855dd32c54efe78c52

  • SHA1

    3726a5e90476b91bc9ceacfbbe75c68cbc54fabe

  • SHA256

    cf3bad2610c81f185d1adc6ad7eaf2ade0c63cc92ca529f767cbf0e2dce23b65

  • SHA512

    dbf75eff62a498dbb461b8e274f8f2d28b07c6b866775430e5d3b45cdf7433a1d97b22d57eb5c1efd1f3fe56c25a9dc2c66d2de02cce79eb6759ce6e2c1f910c

  • SSDEEP

    196608:olL1J4+LqG0pkRvMgTaCdJ++fMQMbNJqtKTau0wAkISwX:ol0aCp0vMgTaCj+MvQLAmE

Malware Config

Targets

    • Target

      6aa131876809cb855dd32c54efe78c52_JaffaCakes118

    • Size

      10.3MB

    • MD5

      6aa131876809cb855dd32c54efe78c52

    • SHA1

      3726a5e90476b91bc9ceacfbbe75c68cbc54fabe

    • SHA256

      cf3bad2610c81f185d1adc6ad7eaf2ade0c63cc92ca529f767cbf0e2dce23b65

    • SHA512

      dbf75eff62a498dbb461b8e274f8f2d28b07c6b866775430e5d3b45cdf7433a1d97b22d57eb5c1efd1f3fe56c25a9dc2c66d2de02cce79eb6759ce6e2c1f910c

    • SSDEEP

      196608:olL1J4+LqG0pkRvMgTaCdJ++fMQMbNJqtKTau0wAkISwX:ol0aCp0vMgTaCj+MvQLAmE

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Matrix

Tasks