General

  • Target

    99911a73a7815cf1401934c9d1f40adf_JaffaCakes118

  • Size

    17.9MB

  • Sample

    240605-3ylbnscc41

  • MD5

    99911a73a7815cf1401934c9d1f40adf

  • SHA1

    b9d3d84f43128729f03386c5533b54bb5f80ce7f

  • SHA256

    e4d0a8fc9d06a98e23967dcf30d3b3f0a1403840edcd197d8415193fd087a35f

  • SHA512

    afda063d480ab033b20e39763cdf3b21a9e9f103df8261e80d1f802f291c3d121ed82beb23336cb643856c25129a5d3c9cc211196a1ed1b75c2870f49b7739f2

  • SSDEEP

    393216:+4nnA8rloLpiOt1CkKhaGQisdv9ThRJAr0Nb06z9sflgAaVH4RZig:+4A8rSpJOcGBQ9ThN1JygA7r

Malware Config

Targets

    • Target

      99911a73a7815cf1401934c9d1f40adf_JaffaCakes118

    • Size

      17.9MB

    • MD5

      99911a73a7815cf1401934c9d1f40adf

    • SHA1

      b9d3d84f43128729f03386c5533b54bb5f80ce7f

    • SHA256

      e4d0a8fc9d06a98e23967dcf30d3b3f0a1403840edcd197d8415193fd087a35f

    • SHA512

      afda063d480ab033b20e39763cdf3b21a9e9f103df8261e80d1f802f291c3d121ed82beb23336cb643856c25129a5d3c9cc211196a1ed1b75c2870f49b7739f2

    • SSDEEP

      393216:+4nnA8rloLpiOt1CkKhaGQisdv9ThRJAr0Nb06z9sflgAaVH4RZig:+4A8rSpJOcGBQ9ThN1JygA7r

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks