General

  • Target

    95fdf2b128cd0fe49691ceca2022f256_JaffaCakes118

  • Size

    9.0MB

  • Sample

    240604-x53lmsgh4z

  • MD5

    95fdf2b128cd0fe49691ceca2022f256

  • SHA1

    331af6ae694b3ef0ab0d04080d9528c96ce85de7

  • SHA256

    d9582d58fe1330a7ba42832753b3935151746c8c0037711aa79546e6f5296993

  • SHA512

    15025d8d2c1a703b33eb8ab8d97a8a6a018d166c25256a8a77f128b41389155f5a782478ace344763fa5f950e4c3bcd4a405a8ba54a8978649ad513821945206

  • SSDEEP

    196608:PXaHcwl1YPe5jR3540KJ6pr+DgQR5vr6cz0S8h+loFKK1RceTy3m:PdwI25U0KUpr+DRN70S82eT1RNt

Malware Config

Targets

    • Target

      95fdf2b128cd0fe49691ceca2022f256_JaffaCakes118

    • Size

      9.0MB

    • MD5

      95fdf2b128cd0fe49691ceca2022f256

    • SHA1

      331af6ae694b3ef0ab0d04080d9528c96ce85de7

    • SHA256

      d9582d58fe1330a7ba42832753b3935151746c8c0037711aa79546e6f5296993

    • SHA512

      15025d8d2c1a703b33eb8ab8d97a8a6a018d166c25256a8a77f128b41389155f5a782478ace344763fa5f950e4c3bcd4a405a8ba54a8978649ad513821945206

    • SSDEEP

      196608:PXaHcwl1YPe5jR3540KJ6pr+DgQR5vr6cz0S8h+loFKK1RceTy3m:PdwI25U0KUpr+DRN70S82eT1RNt

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks