General

  • Target

    d6244c3288b09103b7c0f0f55daa0920_JaffaCakes118

  • Size

    31.5MB

  • Sample

    240909-mnyk9awcpg

  • MD5

    d6244c3288b09103b7c0f0f55daa0920

  • SHA1

    f6802bf2eb44b9c6688658471b1c1ba9c4d31d16

  • SHA256

    ff707aba06f043064e942e0410997bc6f93633d9aa8d0f6324988e587dbe5bff

  • SHA512

    bf5d928db016aae7908fe2718f9e6cdef9d53af2c357f234a2940573756769a0f314acb586871bf356ad6e1231290e51bc6a2be90260ea48d6e61edef325e4c9

  • SSDEEP

    786432:GU3fsGEoEJij+othwNwr57soblf0uzAVj6fZU6lOqw4DX:rtEKZthwedIoB0uzSjOUJvKX

Malware Config

Targets

    • Target

      d6244c3288b09103b7c0f0f55daa0920_JaffaCakes118

    • Size

      31.5MB

    • MD5

      d6244c3288b09103b7c0f0f55daa0920

    • SHA1

      f6802bf2eb44b9c6688658471b1c1ba9c4d31d16

    • SHA256

      ff707aba06f043064e942e0410997bc6f93633d9aa8d0f6324988e587dbe5bff

    • SHA512

      bf5d928db016aae7908fe2718f9e6cdef9d53af2c357f234a2940573756769a0f314acb586871bf356ad6e1231290e51bc6a2be90260ea48d6e61edef325e4c9

    • SSDEEP

      786432:GU3fsGEoEJij+othwNwr57soblf0uzAVj6fZU6lOqw4DX:rtEKZthwedIoB0uzSjOUJvKX

    • Checks Android system properties for emulator presence.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks