General

  • Target

    6d355a92901dae141d943709dda7815f_JaffaCakes118

  • Size

    16.4MB

  • Sample

    240524-d4nljsbe95

  • MD5

    6d355a92901dae141d943709dda7815f

  • SHA1

    b986484452f2ed9b9a4a0b65ca3836cde41f6815

  • SHA256

    3d9759e53421687b7252353c3b21bf04c0b9bc88fe312d4268c857f70a1c4040

  • SHA512

    f80cbdceaf5c808ff540b5636e8a8406c9797313c7fd7dccd3bab53a2cb04815bdca9a213ba75e8ae1c970562f9e8825e74c31bfc30f69674f7aab4cfd2158ef

  • SSDEEP

    393216:Ihcm9qtrnqtHmBVO5CSoXL+TSKBpHwiO/T+WImI6i:IKftwmjkClaWaWImI3

Malware Config

Targets

    • Target

      6d355a92901dae141d943709dda7815f_JaffaCakes118

    • Size

      16.4MB

    • MD5

      6d355a92901dae141d943709dda7815f

    • SHA1

      b986484452f2ed9b9a4a0b65ca3836cde41f6815

    • SHA256

      3d9759e53421687b7252353c3b21bf04c0b9bc88fe312d4268c857f70a1c4040

    • SHA512

      f80cbdceaf5c808ff540b5636e8a8406c9797313c7fd7dccd3bab53a2cb04815bdca9a213ba75e8ae1c970562f9e8825e74c31bfc30f69674f7aab4cfd2158ef

    • SSDEEP

      393216:Ihcm9qtrnqtHmBVO5CSoXL+TSKBpHwiO/T+WImI6i:IKftwmjkClaWaWImI3

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Matrix

Tasks