General

  • Target

    a7767d5a4c63a23afc005ebc5eaddb64_JaffaCakes118

  • Size

    4.5MB

  • Sample

    240614-bg5kfasfrm

  • MD5

    a7767d5a4c63a23afc005ebc5eaddb64

  • SHA1

    ffbb21dc23c7d63dc0ce04e4673a92175ecf545c

  • SHA256

    dbf24574895a7e6c3d79d64e6a2e8c0f01b55d93b0685f072e064371a848ad8b

  • SHA512

    11998f24e46c8e7f8b8b3760f1c382c48987c83d7096027e2155e25577400534294a3a838e3797c376f0fe2438d5373cb75030dbf34f353ef3ac69f0f50983a7

  • SSDEEP

    98304:ceFtCRitlpFuRQ6Eh1VSbKJ1hxkwPwblZY+Ikea2Eit66gwOAWcvEWDuqfdfTFw:3mRitEW5bBJzMY5knYNW91

Malware Config

Targets

    • Target

      a7767d5a4c63a23afc005ebc5eaddb64_JaffaCakes118

    • Size

      4.5MB

    • MD5

      a7767d5a4c63a23afc005ebc5eaddb64

    • SHA1

      ffbb21dc23c7d63dc0ce04e4673a92175ecf545c

    • SHA256

      dbf24574895a7e6c3d79d64e6a2e8c0f01b55d93b0685f072e064371a848ad8b

    • SHA512

      11998f24e46c8e7f8b8b3760f1c382c48987c83d7096027e2155e25577400534294a3a838e3797c376f0fe2438d5373cb75030dbf34f353ef3ac69f0f50983a7

    • SSDEEP

      98304:ceFtCRitlpFuRQ6Eh1VSbKJ1hxkwPwblZY+Ikea2Eit66gwOAWcvEWDuqfdfTFw:3mRitEW5bBJzMY5knYNW91

    • Checks if the Android device is rooted.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Acquires the wake lock

    • Queries information about active data network

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks