General

  • Target

    9526daf5dd0a92ca823767abf1567123_JaffaCakes118

  • Size

    11.6MB

  • Sample

    240604-rmda5sae85

  • MD5

    9526daf5dd0a92ca823767abf1567123

  • SHA1

    c28c4732a3fe48d5c1e1b2ac6f1740ebd09aa220

  • SHA256

    959c8400e7731b94e7adc3753b250446862c26ccbb63387d4751cc2a9ec5c0be

  • SHA512

    21f9877d017bb2ada1d1fbc1da517f66eed2c6952c51c928b07546d0673cd4e1b63d03748f70d762f83de65754115bfdd04ecb796b3122dd5492d41be7217487

  • SSDEEP

    196608:XhMUbKwWn3grXRQW/UBBj2P+A8ZcLAa+VC18R8DXO7Nt4CblLqmwknonT0vfGoNv:xMUeMXRb/UPGl8Zq+6+M+7iionT0vf9v

Malware Config

Targets

    • Target

      9526daf5dd0a92ca823767abf1567123_JaffaCakes118

    • Size

      11.6MB

    • MD5

      9526daf5dd0a92ca823767abf1567123

    • SHA1

      c28c4732a3fe48d5c1e1b2ac6f1740ebd09aa220

    • SHA256

      959c8400e7731b94e7adc3753b250446862c26ccbb63387d4751cc2a9ec5c0be

    • SHA512

      21f9877d017bb2ada1d1fbc1da517f66eed2c6952c51c928b07546d0673cd4e1b63d03748f70d762f83de65754115bfdd04ecb796b3122dd5492d41be7217487

    • SSDEEP

      196608:XhMUbKwWn3grXRQW/UBBj2P+A8ZcLAa+VC18R8DXO7Nt4CblLqmwknonT0vfGoNv:xMUeMXRb/UPGl8Zq+6+M+7iionT0vf9v

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks