General

  • Target

    6e4b32fd70af981e51d1dc019bc8e734_JaffaCakes118

  • Size

    12.3MB

  • Sample

    240524-m7st4seg38

  • MD5

    6e4b32fd70af981e51d1dc019bc8e734

  • SHA1

    41a0cd3fe31110e3f5f95dfd495947eae8ccfaaa

  • SHA256

    b584429c7909dd1a03eaec9caa71a3d9811481ea6ed8d0f016f0d0d73234c440

  • SHA512

    b3318988ae28fb1d7b0b1c4458116b9e54ba0b871b7b167f2f69a2dec7ccd87f855e68f288a8887ddfc0ad37c92d864d0f514538bff2912f71903ff53c377ec6

  • SSDEEP

    393216:20dlpS71B6PxvEdCsOtC4bBpMdT0slTKUTzcRRD:dSZB60FkCKBmJ0GTKNR

Malware Config

Targets

    • Target

      6e4b32fd70af981e51d1dc019bc8e734_JaffaCakes118

    • Size

      12.3MB

    • MD5

      6e4b32fd70af981e51d1dc019bc8e734

    • SHA1

      41a0cd3fe31110e3f5f95dfd495947eae8ccfaaa

    • SHA256

      b584429c7909dd1a03eaec9caa71a3d9811481ea6ed8d0f016f0d0d73234c440

    • SHA512

      b3318988ae28fb1d7b0b1c4458116b9e54ba0b871b7b167f2f69a2dec7ccd87f855e68f288a8887ddfc0ad37c92d864d0f514538bff2912f71903ff53c377ec6

    • SSDEEP

      393216:20dlpS71B6PxvEdCsOtC4bBpMdT0slTKUTzcRRD:dSZB60FkCKBmJ0GTKNR

    • Checks if the Android device is rooted.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks