General

  • Target

    672ebfd76ed115deaf43587d61f67880_JaffaCakes118

  • Size

    11.9MB

  • Sample

    240522-n4hemsfe8y

  • MD5

    672ebfd76ed115deaf43587d61f67880

  • SHA1

    d512d373a5bfd3162f8000d14af5b7917c3c32fc

  • SHA256

    1f14a05d29497442b937226b35e4bc6c4904ae1bb66cc757690e17e573f9253c

  • SHA512

    b76072bbcbfd58dd3de89ee4c1e1b81e63a35ce5e0ccbf75b8ef8059e94467fb30a9288fc37c1e3949cdcb6e2fa49eceb5b0ea4754240e5c01ee0a4f84ce63a5

  • SSDEEP

    196608:xvrbYrTNvhpXfwEguvz0YnZgTgRKmtlSespPm2r+6ELSgQ8CIoSeQ697KrgWfTUJ:xj8TrpXflrZytDhtm6cOg3/oSBrwVH

Malware Config

Targets

    • Target

      672ebfd76ed115deaf43587d61f67880_JaffaCakes118

    • Size

      11.9MB

    • MD5

      672ebfd76ed115deaf43587d61f67880

    • SHA1

      d512d373a5bfd3162f8000d14af5b7917c3c32fc

    • SHA256

      1f14a05d29497442b937226b35e4bc6c4904ae1bb66cc757690e17e573f9253c

    • SHA512

      b76072bbcbfd58dd3de89ee4c1e1b81e63a35ce5e0ccbf75b8ef8059e94467fb30a9288fc37c1e3949cdcb6e2fa49eceb5b0ea4754240e5c01ee0a4f84ce63a5

    • SSDEEP

      196608:xvrbYrTNvhpXfwEguvz0YnZgTgRKmtlSespPm2r+6ELSgQ8CIoSeQ697KrgWfTUJ:xj8TrpXflrZytDhtm6cOg3/oSBrwVH

    • Checks if the Android device is rooted.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks