General

  • Target

    90e7843b0ca19fddbbaf5b28998d6f76_JaffaCakes118

  • Size

    8.7MB

  • Sample

    240603-hrjt2sfe4z

  • MD5

    90e7843b0ca19fddbbaf5b28998d6f76

  • SHA1

    2d6b5a5e905f3f4557e6b4c988a4fb3103808ab3

  • SHA256

    1e0dcabf1158bccc97c47b61dff7b9b222a67b5cae2f1fcd1fc09ac6dc521bdc

  • SHA512

    33b23cfd9a64a42eb756172701e629c8dae940b324c5525d3a2c3460949df74f948fd960ae5b208a58436ad9cf286aa713ec3fa16cc631a6eb29919b7eb95578

  • SSDEEP

    196608:ok527XdgFhvreKDgkqcqb/zUBWED/qCXlOO1w9k2a2:okmXyFhTeKDgk0b7U0RCXlOO1w9k2a2

Malware Config

Targets

    • Target

      90e7843b0ca19fddbbaf5b28998d6f76_JaffaCakes118

    • Size

      8.7MB

    • MD5

      90e7843b0ca19fddbbaf5b28998d6f76

    • SHA1

      2d6b5a5e905f3f4557e6b4c988a4fb3103808ab3

    • SHA256

      1e0dcabf1158bccc97c47b61dff7b9b222a67b5cae2f1fcd1fc09ac6dc521bdc

    • SHA512

      33b23cfd9a64a42eb756172701e629c8dae940b324c5525d3a2c3460949df74f948fd960ae5b208a58436ad9cf286aa713ec3fa16cc631a6eb29919b7eb95578

    • SSDEEP

      196608:ok527XdgFhvreKDgkqcqb/zUBWED/qCXlOO1w9k2a2:okmXyFhTeKDgk0b7U0RCXlOO1w9k2a2

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks