General

  • Target

    9149235126e4fc9164796fcf465843fe_JaffaCakes118

  • Size

    10.2MB

  • Sample

    240603-lf31bsab3y

  • MD5

    9149235126e4fc9164796fcf465843fe

  • SHA1

    510925fb8a65691da603229fe2d96afe25a6df58

  • SHA256

    e052d0ce6f5f2946108ed527cb9482fe6bcf7c98de9183e3eaf8ca9d71d6697f

  • SHA512

    f987aaa7318c45d4a24a0cee81c34778afc069004f3ed24dd5469b5a24642c201b01b29a7b04fe13ce8ba8277df5fff5e23dd3e36bf88587d03325c61137e1bf

  • SSDEEP

    196608:qDUJxTCy6adBKQvTIDLJuiErmMC1gUwE3bJmT9/fdFZ9a3DJiJuD+dU7yjA8:tPTv6afdEUiErtqpFWdN8JiADaU7yc8

Malware Config

Targets

    • Target

      9149235126e4fc9164796fcf465843fe_JaffaCakes118

    • Size

      10.2MB

    • MD5

      9149235126e4fc9164796fcf465843fe

    • SHA1

      510925fb8a65691da603229fe2d96afe25a6df58

    • SHA256

      e052d0ce6f5f2946108ed527cb9482fe6bcf7c98de9183e3eaf8ca9d71d6697f

    • SHA512

      f987aaa7318c45d4a24a0cee81c34778afc069004f3ed24dd5469b5a24642c201b01b29a7b04fe13ce8ba8277df5fff5e23dd3e36bf88587d03325c61137e1bf

    • SSDEEP

      196608:qDUJxTCy6adBKQvTIDLJuiErmMC1gUwE3bJmT9/fdFZ9a3DJiJuD+dU7yjA8:tPTv6afdEUiErtqpFWdN8JiADaU7yc8

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks