General

  • Target

    9089f1c3da44396633d28e4472de726a_JaffaCakes118

  • Size

    22.6MB

  • Sample

    240603-e6jaaacg84

  • MD5

    9089f1c3da44396633d28e4472de726a

  • SHA1

    e617714131ce4bff73585c888a6bc3c7561f8bea

  • SHA256

    4ec82b6cc221e3c1138fe9b1b864515e82491d04a9267eaefcdba67d19d4671b

  • SHA512

    cb667e5988f86e34b541ee880533ec9f538ce9d4ac28a84e5e9c4dbc456e9ae7dcdcfb6344c369fc4bb4d00c05dcd72859b8cf36fd2b38e1741ac4d94bd7d4c9

  • SSDEEP

    393216:ufySS+P7BqOPG+iJbmHL/+D99jUu0OwUiBfDIMXvQ:TIjYO++iJbmr/a99jUR/VzvQ

Malware Config

Targets

    • Target

      9089f1c3da44396633d28e4472de726a_JaffaCakes118

    • Size

      22.6MB

    • MD5

      9089f1c3da44396633d28e4472de726a

    • SHA1

      e617714131ce4bff73585c888a6bc3c7561f8bea

    • SHA256

      4ec82b6cc221e3c1138fe9b1b864515e82491d04a9267eaefcdba67d19d4671b

    • SHA512

      cb667e5988f86e34b541ee880533ec9f538ce9d4ac28a84e5e9c4dbc456e9ae7dcdcfb6344c369fc4bb4d00c05dcd72859b8cf36fd2b38e1741ac4d94bd7d4c9

    • SSDEEP

      393216:ufySS+P7BqOPG+iJbmHL/+D99jUu0OwUiBfDIMXvQ:TIjYO++iJbmr/a99jUR/VzvQ

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks