General

  • Target

    6d7179c7d17fad90ef546ac5afaa4e12_JaffaCakes118

  • Size

    12.4MB

  • Sample

    240524-fylk4seg49

  • MD5

    6d7179c7d17fad90ef546ac5afaa4e12

  • SHA1

    debaaa606869bcf559577c0384335d19328bf43a

  • SHA256

    1529eaf6ef2a45546d50087067a115ecb602023a4bf1c9206b78a4d18ed9570e

  • SHA512

    66ba53cda85f1921a593e84b68d22676ab3242f93506ae10944d5e1586a06c021fb402104b7d1755a194c086869938324ec6f3f7a78b6836934c7423c57a7c1c

  • SSDEEP

    393216:TbqfzcVWJV7PjRGGPhZUg0RqSefs18wwdS:UcePjYGPhZIpis1HUS

Malware Config

Targets

    • Target

      6d7179c7d17fad90ef546ac5afaa4e12_JaffaCakes118

    • Size

      12.4MB

    • MD5

      6d7179c7d17fad90ef546ac5afaa4e12

    • SHA1

      debaaa606869bcf559577c0384335d19328bf43a

    • SHA256

      1529eaf6ef2a45546d50087067a115ecb602023a4bf1c9206b78a4d18ed9570e

    • SHA512

      66ba53cda85f1921a593e84b68d22676ab3242f93506ae10944d5e1586a06c021fb402104b7d1755a194c086869938324ec6f3f7a78b6836934c7423c57a7c1c

    • SSDEEP

      393216:TbqfzcVWJV7PjRGGPhZUg0RqSefs18wwdS:UcePjYGPhZIpis1HUS

    Score
    8/10
    • Checks if the Android device is rooted.

    • Queries the mobile country code (MCC)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks