General

  • Target

    92ab0608e5deb4353fc13f0743ad0051_JaffaCakes118

  • Size

    31.9MB

  • Sample

    240603-wf1v3sfd65

  • MD5

    92ab0608e5deb4353fc13f0743ad0051

  • SHA1

    def7b2f040d0e866907547298c551659343685bc

  • SHA256

    2c90c0049db6cc7abcacdd2b645d983912cfb5c3496fbb8613aee3eabafdc471

  • SHA512

    cba61fbfc0dbcc5b05dfcbc76bb30c8fb1b6ba9128e1b792e4638ec23140c9961e6840023f64eb7afe8a8ceed143023b2a02f2c86ef0186dbaa62faf34ffdf3e

  • SSDEEP

    786432:/8hQt1KxbrXmYVGWGcfZhpBDRz5I7BqMJ9U3:QQtQNrWYVdGkpVFTq0

Malware Config

Targets

    • Target

      92ab0608e5deb4353fc13f0743ad0051_JaffaCakes118

    • Size

      31.9MB

    • MD5

      92ab0608e5deb4353fc13f0743ad0051

    • SHA1

      def7b2f040d0e866907547298c551659343685bc

    • SHA256

      2c90c0049db6cc7abcacdd2b645d983912cfb5c3496fbb8613aee3eabafdc471

    • SHA512

      cba61fbfc0dbcc5b05dfcbc76bb30c8fb1b6ba9128e1b792e4638ec23140c9961e6840023f64eb7afe8a8ceed143023b2a02f2c86ef0186dbaa62faf34ffdf3e

    • SSDEEP

      786432:/8hQt1KxbrXmYVGWGcfZhpBDRz5I7BqMJ9U3:QQtQNrWYVdGkpVFTq0

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks