General

  • Target

    910b9bccc7e8a20e738b8ec139b3bb05_JaffaCakes118

  • Size

    9.8MB

  • Sample

    240603-jxvdeahh83

  • MD5

    910b9bccc7e8a20e738b8ec139b3bb05

  • SHA1

    8695d86c3cf698599b33bf9a825988cbb89f1f25

  • SHA256

    a7749ac68f8ef308b5e771ea7c92e6973f9b65f0064d53b1a92a1223ae097000

  • SHA512

    11d31431846edf9ec1187b3ff17fecfc789e1d4465074522f739bdd09c63f6e94c8e6197eadeff11f070f96cc843d53b3150fa25e54c6918cd7fed8dcee42df9

  • SSDEEP

    196608:0WcV7gPcUELqkpfH8ayyIFVPM2sS4iVs4QTMznhIp5Xf:0Wkq3aTE1ZFMC8anqz

Malware Config

Targets

    • Target

      910b9bccc7e8a20e738b8ec139b3bb05_JaffaCakes118

    • Size

      9.8MB

    • MD5

      910b9bccc7e8a20e738b8ec139b3bb05

    • SHA1

      8695d86c3cf698599b33bf9a825988cbb89f1f25

    • SHA256

      a7749ac68f8ef308b5e771ea7c92e6973f9b65f0064d53b1a92a1223ae097000

    • SHA512

      11d31431846edf9ec1187b3ff17fecfc789e1d4465074522f739bdd09c63f6e94c8e6197eadeff11f070f96cc843d53b3150fa25e54c6918cd7fed8dcee42df9

    • SSDEEP

      196608:0WcV7gPcUELqkpfH8ayyIFVPM2sS4iVs4QTMznhIp5Xf:0Wkq3aTE1ZFMC8anqz

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks