General

  • Target

    96b82c620bc2034dff4d258f255b312b_JaffaCakes118

  • Size

    22.5MB

  • Sample

    240605-af667sga7w

  • MD5

    96b82c620bc2034dff4d258f255b312b

  • SHA1

    7779d261b0f5ef97d0a66dec6dfe2317ece8c56f

  • SHA256

    38a92125bdc571f5c01f27b1012c505441cbad932896ef338bd0a58c63d367a4

  • SHA512

    fb4d75a98fdcc5979836b427231b3583de1ae70c7f1ebc23ef870b0c10558852511198a9886ee9b2a0facaa59f415eacff59163d45dbd50b73a16e213aa0d7b3

  • SSDEEP

    393216:WbygcW74+JemoIcmgykF6G7YYm/rIXbGXOkSoLgoHJi6NngLxF4deECHyqmaJbGp:WbxcD+BoIe0GdcryGXzbHJiiQWeXSqXC

Malware Config

Targets

    • Target

      96b82c620bc2034dff4d258f255b312b_JaffaCakes118

    • Size

      22.5MB

    • MD5

      96b82c620bc2034dff4d258f255b312b

    • SHA1

      7779d261b0f5ef97d0a66dec6dfe2317ece8c56f

    • SHA256

      38a92125bdc571f5c01f27b1012c505441cbad932896ef338bd0a58c63d367a4

    • SHA512

      fb4d75a98fdcc5979836b427231b3583de1ae70c7f1ebc23ef870b0c10558852511198a9886ee9b2a0facaa59f415eacff59163d45dbd50b73a16e213aa0d7b3

    • SSDEEP

      393216:WbygcW74+JemoIcmgykF6G7YYm/rIXbGXOkSoLgoHJi6NngLxF4deECHyqmaJbGp:WbxcD+BoIe0GdcryGXzbHJiiQWeXSqXC

    • Checks if the Android device is rooted.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

MITRE ATT&CK Mobile v15

Tasks