General

  • Target

    7c8b32cae36aa2b86b834aa3b74ae6fa_JaffaCakes118

  • Size

    27.3MB

  • Sample

    240528-lx4m7aeg3t

  • MD5

    7c8b32cae36aa2b86b834aa3b74ae6fa

  • SHA1

    f931610ae5f3c6e5bbe47c1ee4fd739fec9433c5

  • SHA256

    09da8bd04ce6f2d73b1c31a0d7f86d0c9ac8ea89d3ea5cd07b67323cf1e232cf

  • SHA512

    061a8b2bae9a46da12787c8a395fa0033289c6735403587695b74aa8210daa8f3483653ea81ab851cce6edc0fd25cd274d5719b24359efa35ecb0e26aabc3ebe

  • SSDEEP

    393216:FpExDVCTNad7mTKoh5fsAwyBwJoVmcacHOK2n9p6xvCG8VmrqwF7L8Y/RDMOOH+E:gxDONUaTKqtBpmc217gJB88DMH

Malware Config

Targets

    • Target

      7c8b32cae36aa2b86b834aa3b74ae6fa_JaffaCakes118

    • Size

      27.3MB

    • MD5

      7c8b32cae36aa2b86b834aa3b74ae6fa

    • SHA1

      f931610ae5f3c6e5bbe47c1ee4fd739fec9433c5

    • SHA256

      09da8bd04ce6f2d73b1c31a0d7f86d0c9ac8ea89d3ea5cd07b67323cf1e232cf

    • SHA512

      061a8b2bae9a46da12787c8a395fa0033289c6735403587695b74aa8210daa8f3483653ea81ab851cce6edc0fd25cd274d5719b24359efa35ecb0e26aabc3ebe

    • SSDEEP

      393216:FpExDVCTNad7mTKoh5fsAwyBwJoVmcacHOK2n9p6xvCG8VmrqwF7L8Y/RDMOOH+E:gxDONUaTKqtBpmc217gJB88DMH

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks