General

  • Target

    a52033c9bbccdf2d8829fe0999680b27_JaffaCakes118

  • Size

    3.3MB

  • Sample

    240613-mqyn2ayhqn

  • MD5

    a52033c9bbccdf2d8829fe0999680b27

  • SHA1

    344a3dabe59f2c1fe941b2abb991eff8ce0cad8d

  • SHA256

    8fdc6ffc0e90b6527784ac984e672fcb3e893f45f524b5d3f56f4c621d55ef1f

  • SHA512

    248a7496e385c9f3d62a86735fc5e3a6dcc2b50686613e92d7c28deac7048ef9742d53dd4ee3d48f3bd6a46eecc96c29a1f73b9c733c6283361fbdbbd32b8d77

  • SSDEEP

    98304:5msKoQFnvKx7tNT/5r6SxBh3t2zrHGL9QBGYtjtEYU:XHQNKf95r6Sri09Qwh

Malware Config

Targets

    • Target

      a52033c9bbccdf2d8829fe0999680b27_JaffaCakes118

    • Size

      3.3MB

    • MD5

      a52033c9bbccdf2d8829fe0999680b27

    • SHA1

      344a3dabe59f2c1fe941b2abb991eff8ce0cad8d

    • SHA256

      8fdc6ffc0e90b6527784ac984e672fcb3e893f45f524b5d3f56f4c621d55ef1f

    • SHA512

      248a7496e385c9f3d62a86735fc5e3a6dcc2b50686613e92d7c28deac7048ef9742d53dd4ee3d48f3bd6a46eecc96c29a1f73b9c733c6283361fbdbbd32b8d77

    • SSDEEP

      98304:5msKoQFnvKx7tNT/5r6SxBh3t2zrHGL9QBGYtjtEYU:XHQNKf95r6Sri09Qwh

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks