General

  • Target

    a1ec349f393e5b600905fa5d0c512421_JaffaCakes118

  • Size

    7.4MB

  • Sample

    240612-xw68gawfqa

  • MD5

    a1ec349f393e5b600905fa5d0c512421

  • SHA1

    6834d54b0967e995441ca163f167002f0cd06077

  • SHA256

    7d7724c358e480136276f0d09ce84dfa5f434f02665c0917d8f41931b91c7d38

  • SHA512

    510a636acaa3b70340c77f07cc050547de3f684da492ae85cc3d6bc4919d4d88d50c889f2568c16aa2ce311b92ded6c25e032d8ab6990fb1e5d837c8c69c4f86

  • SSDEEP

    98304:TkaDeBZFTZOJFAn+izpZVc0u6bhlwPICdh:TSZOJFAn+it73hlZC

Malware Config

Targets

    • Target

      a1ec349f393e5b600905fa5d0c512421_JaffaCakes118

    • Size

      7.4MB

    • MD5

      a1ec349f393e5b600905fa5d0c512421

    • SHA1

      6834d54b0967e995441ca163f167002f0cd06077

    • SHA256

      7d7724c358e480136276f0d09ce84dfa5f434f02665c0917d8f41931b91c7d38

    • SHA512

      510a636acaa3b70340c77f07cc050547de3f684da492ae85cc3d6bc4919d4d88d50c889f2568c16aa2ce311b92ded6c25e032d8ab6990fb1e5d837c8c69c4f86

    • SSDEEP

      98304:TkaDeBZFTZOJFAn+izpZVc0u6bhlwPICdh:TSZOJFAn+it73hlZC

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks