General

  • Target

    90eda8fab157875cddf3cef3fc760a4d_JaffaCakes118

  • Size

    17.3MB

  • Sample

    240603-h4fm6aha38

  • MD5

    90eda8fab157875cddf3cef3fc760a4d

  • SHA1

    1ca6adfdf2e4d078ba195860bf797878f6f5ab27

  • SHA256

    4e3c10e59b61650ce428aab76c7e1439de073e8b11700ba6088e9ccc7ce6e205

  • SHA512

    da7d50835325ed9bb642f9e15f07c57053fb38556f721ab12e8742263509c98c15a8c4582230c8ed04d056bbc6cdc2fa571688df0fbe5a0b8a6615de139ff7d1

  • SSDEEP

    393216:7vfP8Gxx2UmTrL6cb8l6fPLP0SIsSCQa0FkflCcqlVmRl9t:LRxtuA8PLP09sSltOfJq3S9t

Malware Config

Targets

    • Target

      90eda8fab157875cddf3cef3fc760a4d_JaffaCakes118

    • Size

      17.3MB

    • MD5

      90eda8fab157875cddf3cef3fc760a4d

    • SHA1

      1ca6adfdf2e4d078ba195860bf797878f6f5ab27

    • SHA256

      4e3c10e59b61650ce428aab76c7e1439de073e8b11700ba6088e9ccc7ce6e205

    • SHA512

      da7d50835325ed9bb642f9e15f07c57053fb38556f721ab12e8742263509c98c15a8c4582230c8ed04d056bbc6cdc2fa571688df0fbe5a0b8a6615de139ff7d1

    • SSDEEP

      393216:7vfP8Gxx2UmTrL6cb8l6fPLP0SIsSCQa0FkflCcqlVmRl9t:LRxtuA8PLP09sSltOfJq3S9t

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks