General

  • Target

    6d83017e1b195aee1ca4221f2fcbad33_JaffaCakes118

  • Size

    14.5MB

  • Sample

    240524-gh3p5aff5x

  • MD5

    6d83017e1b195aee1ca4221f2fcbad33

  • SHA1

    8abb6f5de6455bcec18e53ca3c4b71295a0f6dd6

  • SHA256

    c0d13c0ee35c4fccbd3fe27fb1b6d6a0510f5ad4a5c51adde6f5b6dba7c16ac7

  • SHA512

    d86c0bc4acedf5799c8e1a4a04fd2ff8270bff4e57171ce6698acbb8e79315facc4c2a0ae000b756952d5cd0a2a3aa0ffdf3ad3dbe156fa0b4e63ddbf3932e45

  • SSDEEP

    393216:OLNfiCZrezB25r6ykGl3FzysWyqVCvjX9TQlmep7jpOabwgbJ:OBiorco5r6ykG3RhGCvjNTS75fJ

Malware Config

Targets

    • Target

      6d83017e1b195aee1ca4221f2fcbad33_JaffaCakes118

    • Size

      14.5MB

    • MD5

      6d83017e1b195aee1ca4221f2fcbad33

    • SHA1

      8abb6f5de6455bcec18e53ca3c4b71295a0f6dd6

    • SHA256

      c0d13c0ee35c4fccbd3fe27fb1b6d6a0510f5ad4a5c51adde6f5b6dba7c16ac7

    • SHA512

      d86c0bc4acedf5799c8e1a4a04fd2ff8270bff4e57171ce6698acbb8e79315facc4c2a0ae000b756952d5cd0a2a3aa0ffdf3ad3dbe156fa0b4e63ddbf3932e45

    • SSDEEP

      393216:OLNfiCZrezB25r6ykGl3FzysWyqVCvjX9TQlmep7jpOabwgbJ:OBiorco5r6ykG3RhGCvjNTS75fJ

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks