General

  • Target

    84554324900cd460782ec7729eabc842_JaffaCakes118

  • Size

    30.3MB

  • Sample

    240530-qvmzwaac8x

  • MD5

    84554324900cd460782ec7729eabc842

  • SHA1

    515524b266a9b5ac99c764da9b50ed1d1a3c7eb2

  • SHA256

    6bdf730501010cb2fa4fd07f20ac42a49096f9d0a55cd83af4c89bb5270c0bdd

  • SHA512

    4abc1a2b756501ca5acee5d8a51fa85d3594107cdac525b85c7348764cb1aa36db1d9e00623b683c81d6f8b2dd087b04d1583b4885cc1061a446627d7ff978ce

  • SSDEEP

    786432:R8Ig17IC7PmIMryqp2jZPYpsEAQvA9C0/smCQzREet:w1sC7PmH52VPYpsJ+A9X/ssn

Malware Config

Targets

    • Target

      84554324900cd460782ec7729eabc842_JaffaCakes118

    • Size

      30.3MB

    • MD5

      84554324900cd460782ec7729eabc842

    • SHA1

      515524b266a9b5ac99c764da9b50ed1d1a3c7eb2

    • SHA256

      6bdf730501010cb2fa4fd07f20ac42a49096f9d0a55cd83af4c89bb5270c0bdd

    • SHA512

      4abc1a2b756501ca5acee5d8a51fa85d3594107cdac525b85c7348764cb1aa36db1d9e00623b683c81d6f8b2dd087b04d1583b4885cc1061a446627d7ff978ce

    • SSDEEP

      786432:R8Ig17IC7PmIMryqp2jZPYpsEAQvA9C0/smCQzREet:w1sC7PmH52VPYpsJ+A9X/ssn

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks